Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-1789
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2015:1184", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" }, { "name": "SSRT102180", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2" }, { "name": "DSA-3287", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3287" }, { "name": "SUSE-SU-2015:1150", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122" }, { "name": "SUSE-SU-2015:1183", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" }, { "tags": [ "x_transferred" ], "url": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11" }, { "tags": [ "x_transferred" ], "url": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "HPSBMU03409", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965" }, { "tags": [ "x_transferred" ], "url": "https://openssl.org/news/secadv/20150611.txt" }, { "name": "RHSA-2015:1115", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1115.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "RHSA-2015:1197", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1197.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "name": "SUSE-SU-2015:1182", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "SUSE-SU-2015:1143", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "name": "openSUSE-SU-2016:0640", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "1032564", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032564" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "tags": [ "x_transferred" ], "url": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015" }, { "name": "FEDORA-2015-10108", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl" }, { "name": "openSUSE-SU-2015:1277", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" }, { "name": "SUSE-SU-2015:1181", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "USN-2639-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2639-1" }, { "tags": [ "x_transferred" ], "url": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "name": "GLSA-201506-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201506-02" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "HPSBUX03388", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "name": "FEDORA-2015-10047", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html" }, { "name": "75156", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75156" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX216642" }, { "name": "SUSE-SU-2015:1185", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694" }, { "name": "openSUSE-SU-2015:1139", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" }, { "tags": [ "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa98" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733" }, { "name": "NetBSD-SA2015-008", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc" }, { "tags": [ "x_transferred" ], "url": "https://www.openssl.org/news/secadv_20150611.txt" }, { "name": "HPSBGN03371", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2" }, { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SUSE-SU-2015:1184", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" }, { "name": "SSRT102180", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2" }, { "name": "DSA-3287", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2015/dsa-3287" }, { "name": "SUSE-SU-2015:1150", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122" }, { "name": "SUSE-SU-2015:1183", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" }, { "url": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11" }, { "url": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "HPSBMU03409", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965" }, { "url": "https://openssl.org/news/secadv/20150611.txt" }, { "name": "RHSA-2015:1115", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1115.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "RHSA-2015:1197", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1197.html" }, { "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "name": "SUSE-SU-2015:1182", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "SUSE-SU-2015:1143", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351" }, { "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "name": "openSUSE-SU-2016:0640", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "1032564", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1032564" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "url": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015" }, { "name": "FEDORA-2015-10108", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", "tags": [ "vendor-advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl" }, { "name": "openSUSE-SU-2015:1277", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" }, { "name": "SUSE-SU-2015:1181", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "USN-2639-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2639-1" }, { "url": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "name": "GLSA-201506-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201506-02" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "91787", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "HPSBUX03388", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "name": "FEDORA-2015-10047", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html" }, { "name": "75156", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/75156" }, { "url": "https://support.apple.com/kb/HT205031" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "url": "https://support.citrix.com/article/CTX216642" }, { "name": "SUSE-SU-2015:1185", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694" }, { "name": "openSUSE-SU-2015:1139", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" }, { "url": "https://bto.bluecoat.com/security-advisory/sa98" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733" }, { "name": "NetBSD-SA2015-008", "tags": [ "vendor-advisory" ], "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc" }, { "url": "https://www.openssl.org/news/secadv_20150611.txt" }, { "name": "HPSBGN03371", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2" }, { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-1789", "datePublished": "2015-06-12T00:00:00", "dateReserved": "2015-02-17T00:00:00", "dateUpdated": "2024-08-06T04:54:16.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-1789\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-06-12T19:59:02.507\",\"lastModified\":\"2024-11-21T02:26:08.423\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n X509_cmp_time en crypto/x509/x509_vfy.c en OpenSSL anterior a 0.9.8zg, 1.0.0 anterior a 1.0.0s, 1.0.1 anterior a 1.0.1n, y 1.0.2 anterior a 1.0.2b permite a atacantes remotos causar una denegaci\u00f3n de servicio (lectura fuera de rango y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de un campo de longitud manipulado en datos ASN1_TIME, tal y como fue demostrado mediante un ataque sobre un servidor que soporta la autenticaci\u00f3n de clientes con una rellamada de verificaci\u00f3n personalizada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.9.8zf\",\"matchCriteriaId\":\"8F73A6A3-0F0C-461D-AA7A-940A9DBBFE92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2075BD-6102-4B0F-839A-836E9585F43B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A2FA09E-2BF7-4968-B62D-00DA57F81EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02E634E-1E3D-4E44-BADA-76F92483A732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC2B07A-49EF-411F-8A4D-89435E22B043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E9480D6-3B6A-4C41-B8C1-C3F945040772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FF0A06-DA61-4250-B083-67E55E362677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6BA453-C150-4159-B80B-5465EFF83F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638A2E69-8AB6-4FEA-852A-FEF16A500C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C47D3A-B99D-401D-B6B8-1194B2DB4809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08355B10-E004-4BE6-A5AE-4D428810580B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738BCFDC-1C49-4774-95AE-E099F707DEF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B242C0-D27D-4644-AD19-5ACB853C9DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC683F2-4346-4E5E-A8D7-67B4F4D7827B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"132B9217-B0E0-4E3E-9096-162AA28E158E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7619F9A0-9054-4217-93D1-3EA64876C5B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D82C405-17E2-4DF1-8DF5-315BD5A41595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C96806F-4718-4BD3-9102-55A26AA86498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A16CD99-AF7F-4931-AD2E-77727BA18FBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88440697-754A-47A7-BF83-4D0EB68FFB10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD51F0FC-F426-4AE5-B3B9-B813C580EBAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38721148-F24A-4339-8282-BC2DD9553512\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F16D65-8A46-4AC7-8970-73AB700035FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F393FF-7E6F-4671-BFBF-060162E12659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B85A09-CF8D-409D-966E-168F9959F6F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C684FB18-FDDC-4BED-A28C-C23EE6CD0094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74A79A7-4FAF-4C81-8622-050008B96AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEDACCB9-8D61-49EE-9957-9E58BC7BB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4993DD56-F9E3-4AC8-AC3E-BF204B950DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E884B241-F9C3-44F8-A420-DE65F5F3D660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A383620-B4F7-44A7-85DA-A4FF2E115D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0C6812-F455-49CF-B29B-9AC00306DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2D462C-A1B4-4572-A615-BDE9DC5F1E55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3703E445-17C0-4C85-A496-A35641C0C8DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4034B9-EF1C-40E6-B92A-D4D7B7E7E774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABEC1927-F469-4B9E-B544-DA6CF90F0B34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE2188F9-FAF8-4A0C-BB49-E95BDBC119BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3E5C1B-EC63-4214-A0BD-0B8681CE6C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18797BEE-417D-4959-9AAD-C5A7C051B524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F946FD-F564-49DA-B043-5943308BA9EE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1121\",\"matchCriteriaId\":\"6AF02A45-1811-44F2-B3C9-90C11F5DF6DF\"}]}]}],\"references\":[{\"url\":\"http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1115.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1197.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3287\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/75156\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/91787\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1032564\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2639-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa98\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://openssl.org/news/secadv/20150611.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/201506-02\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.apple.com/kb/HT205031\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.citrix.com/article/CTX216642\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.openssl.org/news/secadv_20150611.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1115.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1197.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/75156\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/91787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1032564\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2639-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa98\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://openssl.org/news/secadv/20150611.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201506-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/kb/HT205031\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX216642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openssl.org/news/secadv_20150611.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ICSA-22-349-21
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow a denial-of-service condition or could lead to execution of arbitrary code.", "title": "Risk evaluation" }, { "category": "other", "text": " Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "These vulnerabilities are exploitable remotely. These vulnerabilities have a low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-412672.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-21 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-21.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-21 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-21" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-412672.txt" } ], "title": "Siemens SCALANCE X-200RNA Switch Devices", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-21", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA (HSR) (6GK5204-0BA00-2MB2)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2MB2" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA (HSR) (6GK5204-0BA00-2MB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA (PRP) (6GK5204-0BA00-2KB2)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2KB2" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA (PRP) (6GK5204-0BA00-2KB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (HSR) (6GK5204-0BS00-2NA3)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-2NA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (HSR) (6GK5204-0BS00-2NA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (PRP) (6GK5204-0BS00-3LA3)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-3LA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (PRP) (6GK5204-0BS00-3LA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (PRP/HSR) (6GK5204-0BS00-3PA3)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-3PA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (PRP/HSR) (6GK5204-0BS00-3PA3)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0190", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0190" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2003-0190" }, { "cve": "CVE-2003-1562", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-1562" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2003-1562" }, { "cve": "CVE-2014-8176", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2014-8176" }, { "cve": "CVE-2015-0207", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DTLS 1.0 traffic to a DTLS 1.2 server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0207" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0207" }, { "cve": "CVE-2015-0208", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0208" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0208" }, { "cve": "CVE-2015-0209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0209" }, { "cve": "CVE-2015-0285", "cwe": { "id": "CWE-335", "name": "Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)" }, "notes": [ { "category": "summary", "text": "The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0285" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0285" }, { "cve": "CVE-2015-0286", "cwe": { "id": "CWE-1024", "name": "Comparison of Incompatible Types" }, "notes": [ { "category": "summary", "text": "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0286" }, { "cve": "CVE-2015-0287", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0287" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0287" }, { "cve": "CVE-2015-0288", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0288" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0288" }, { "cve": "CVE-2015-0289", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0289" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0289" }, { "cve": "CVE-2015-0290", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0290" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0290" }, { "cve": "CVE-2015-0291", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0291" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0291" }, { "cve": "CVE-2015-0292", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0292" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0292" }, { "cve": "CVE-2015-0293", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0293" }, { "cve": "CVE-2015-1787", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1787" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1787" }, { "cve": "CVE-2015-1788", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1788" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1788" }, { "cve": "CVE-2015-1789", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1789" }, { "cve": "CVE-2015-1790", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1790" }, { "cve": "CVE-2015-1791", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1791" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1791" }, { "cve": "CVE-2015-1792", "cwe": { "id": "CWE-690", "name": "Unchecked Return Value to NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1792" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1792" }, { "cve": "CVE-2015-1794", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1794" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1794" }, { "cve": "CVE-2015-3193", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3193" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3194" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3195" }, { "cve": "CVE-2015-3196", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3196" }, { "cve": "CVE-2015-3197", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3197" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3197" }, { "cve": "CVE-2015-4000", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-5352", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "notes": [ { "category": "summary", "text": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5352" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-5352" }, { "cve": "CVE-2015-5600", "cwe": { "id": "CWE-799", "name": "Improper Control of Interaction Frequency" }, "notes": [ { "category": "summary", "text": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5600" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-5600" }, { "cve": "CVE-2015-6563", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6563" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6563" }, { "cve": "CVE-2015-6564", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6564" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6564" }, { "cve": "CVE-2015-6565", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6565" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6565" }, { "cve": "CVE-2015-8325", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8325" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-8325" }, { "cve": "CVE-2016-0701", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0701" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0701" }, { "cve": "CVE-2016-0702", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a \"CacheBleed\" attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0702" }, { "cve": "CVE-2016-0703", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0703" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0703" }, { "cve": "CVE-2016-0704", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0704" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0704" }, { "cve": "CVE-2016-0705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0705" }, { "cve": "CVE-2016-0777", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0777" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0777" }, { "cve": "CVE-2016-0778", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0778" }, { "cve": "CVE-2016-0797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0797" }, { "cve": "CVE-2016-0798", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0798" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0798" }, { "cve": "CVE-2016-0799", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0799" }, { "cve": "CVE-2016-0800", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A cross-protocol attack was discovered that could allow an attacker to decrypt intercepted TLS sessions by using a server supporting SSLv2 as a Bleichenbacher RSA padding oracle.\nIn order to exploit the vulnerability, the attacker must have network access to the affected devices and must be in a privileged network position.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0800" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0800" }, { "cve": "CVE-2016-1907", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1907" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-1907" }, { "cve": "CVE-2016-1908", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1908" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-1908" }, { "cve": "CVE-2016-2105", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2105" }, { "cve": "CVE-2016-2106", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2106" }, { "cve": "CVE-2016-2107", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2107" }, { "cve": "CVE-2016-2108", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2109" }, { "cve": "CVE-2016-2176", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2176" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2176" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2177" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2179", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2179" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2179" }, { "cve": "CVE-2016-2180", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2180" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2180" }, { "cve": "CVE-2016-2181", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2181" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2181" }, { "cve": "CVE-2016-2182", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2182" }, { "cve": "CVE-2016-2183", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-6210", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6210" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6210" }, { "cve": "CVE-2016-6302", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6302" }, { "cve": "CVE-2016-6303", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6303" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6303" }, { "cve": "CVE-2016-6304", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6305", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6305" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6305" }, { "cve": "CVE-2016-6306", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-6307", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6307" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6307" }, { "cve": "CVE-2016-6308", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6308" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6308" }, { "cve": "CVE-2016-6515", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6515" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6515" }, { "cve": "CVE-2016-8858", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-8858" }, { "cve": "CVE-2016-10009", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10009" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10009" }, { "cve": "CVE-2016-10010", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10010" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10010" }, { "cve": "CVE-2016-10011", "cwe": { "id": "CWE-244", "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)" }, "notes": [ { "category": "summary", "text": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10011" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10011" }, { "cve": "CVE-2016-10012", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10012" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10012" }, { "cve": "CVE-2017-3735", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3735" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-3735" }, { "cve": "CVE-2017-15906", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15906" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-15906" }, { "cve": "CVE-2018-15473", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15473" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-15473" }, { "cve": "CVE-2018-20685", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-1552", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be \u0027/usr/local\u0027. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of \u0027C:/usr/local\u0027, which may be world writable, which enables untrusted users to modify OpenSSL\u0027s default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, \u0027/usr/local/ssl\u0027 is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1552" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1552" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6109" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6110" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6111" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6111" }, { "cve": "CVE-2019-16905", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16905" } ] }
icsa-22-349-21
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow a denial-of-service condition or could lead to execution of arbitrary code.", "title": "Risk evaluation" }, { "category": "other", "text": " Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "These vulnerabilities are exploitable remotely. These vulnerabilities have a low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-412672.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-21 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-21.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-21 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-21" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-412672.txt" } ], "title": "Siemens SCALANCE X-200RNA Switch Devices", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-21", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA (HSR) (6GK5204-0BA00-2MB2)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2MB2" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA (HSR) (6GK5204-0BA00-2MB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA (PRP) (6GK5204-0BA00-2KB2)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2KB2" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA (PRP) (6GK5204-0BA00-2KB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (HSR) (6GK5204-0BS00-2NA3)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-2NA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (HSR) (6GK5204-0BS00-2NA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (PRP) (6GK5204-0BS00-3LA3)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-3LA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (PRP) (6GK5204-0BS00-3LA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (PRP/HSR) (6GK5204-0BS00-3PA3)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-3PA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (PRP/HSR) (6GK5204-0BS00-3PA3)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0190", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0190" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2003-0190" }, { "cve": "CVE-2003-1562", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-1562" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2003-1562" }, { "cve": "CVE-2014-8176", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2014-8176" }, { "cve": "CVE-2015-0207", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DTLS 1.0 traffic to a DTLS 1.2 server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0207" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0207" }, { "cve": "CVE-2015-0208", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0208" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0208" }, { "cve": "CVE-2015-0209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0209" }, { "cve": "CVE-2015-0285", "cwe": { "id": "CWE-335", "name": "Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)" }, "notes": [ { "category": "summary", "text": "The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0285" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0285" }, { "cve": "CVE-2015-0286", "cwe": { "id": "CWE-1024", "name": "Comparison of Incompatible Types" }, "notes": [ { "category": "summary", "text": "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0286" }, { "cve": "CVE-2015-0287", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0287" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0287" }, { "cve": "CVE-2015-0288", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0288" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0288" }, { "cve": "CVE-2015-0289", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0289" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0289" }, { "cve": "CVE-2015-0290", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0290" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0290" }, { "cve": "CVE-2015-0291", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0291" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0291" }, { "cve": "CVE-2015-0292", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0292" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0292" }, { "cve": "CVE-2015-0293", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0293" }, { "cve": "CVE-2015-1787", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1787" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1787" }, { "cve": "CVE-2015-1788", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1788" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1788" }, { "cve": "CVE-2015-1789", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1789" }, { "cve": "CVE-2015-1790", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1790" }, { "cve": "CVE-2015-1791", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1791" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1791" }, { "cve": "CVE-2015-1792", "cwe": { "id": "CWE-690", "name": "Unchecked Return Value to NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1792" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1792" }, { "cve": "CVE-2015-1794", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1794" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1794" }, { "cve": "CVE-2015-3193", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3193" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3194" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3195" }, { "cve": "CVE-2015-3196", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3196" }, { "cve": "CVE-2015-3197", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3197" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3197" }, { "cve": "CVE-2015-4000", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-5352", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "notes": [ { "category": "summary", "text": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5352" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-5352" }, { "cve": "CVE-2015-5600", "cwe": { "id": "CWE-799", "name": "Improper Control of Interaction Frequency" }, "notes": [ { "category": "summary", "text": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5600" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-5600" }, { "cve": "CVE-2015-6563", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6563" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6563" }, { "cve": "CVE-2015-6564", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6564" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6564" }, { "cve": "CVE-2015-6565", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6565" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6565" }, { "cve": "CVE-2015-8325", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8325" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-8325" }, { "cve": "CVE-2016-0701", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0701" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0701" }, { "cve": "CVE-2016-0702", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a \"CacheBleed\" attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0702" }, { "cve": "CVE-2016-0703", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0703" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0703" }, { "cve": "CVE-2016-0704", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0704" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0704" }, { "cve": "CVE-2016-0705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0705" }, { "cve": "CVE-2016-0777", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0777" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0777" }, { "cve": "CVE-2016-0778", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0778" }, { "cve": "CVE-2016-0797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0797" }, { "cve": "CVE-2016-0798", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0798" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0798" }, { "cve": "CVE-2016-0799", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0799" }, { "cve": "CVE-2016-0800", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A cross-protocol attack was discovered that could allow an attacker to decrypt intercepted TLS sessions by using a server supporting SSLv2 as a Bleichenbacher RSA padding oracle.\nIn order to exploit the vulnerability, the attacker must have network access to the affected devices and must be in a privileged network position.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0800" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0800" }, { "cve": "CVE-2016-1907", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1907" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-1907" }, { "cve": "CVE-2016-1908", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1908" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-1908" }, { "cve": "CVE-2016-2105", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2105" }, { "cve": "CVE-2016-2106", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2106" }, { "cve": "CVE-2016-2107", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2107" }, { "cve": "CVE-2016-2108", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2109" }, { "cve": "CVE-2016-2176", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2176" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2176" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2177" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2179", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2179" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2179" }, { "cve": "CVE-2016-2180", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2180" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2180" }, { "cve": "CVE-2016-2181", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2181" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2181" }, { "cve": "CVE-2016-2182", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2182" }, { "cve": "CVE-2016-2183", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-6210", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6210" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6210" }, { "cve": "CVE-2016-6302", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6302" }, { "cve": "CVE-2016-6303", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6303" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6303" }, { "cve": "CVE-2016-6304", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6305", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6305" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6305" }, { "cve": "CVE-2016-6306", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-6307", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6307" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6307" }, { "cve": "CVE-2016-6308", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6308" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6308" }, { "cve": "CVE-2016-6515", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6515" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6515" }, { "cve": "CVE-2016-8858", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-8858" }, { "cve": "CVE-2016-10009", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10009" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10009" }, { "cve": "CVE-2016-10010", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10010" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10010" }, { "cve": "CVE-2016-10011", "cwe": { "id": "CWE-244", "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)" }, "notes": [ { "category": "summary", "text": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10011" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10011" }, { "cve": "CVE-2016-10012", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10012" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10012" }, { "cve": "CVE-2017-3735", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3735" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-3735" }, { "cve": "CVE-2017-15906", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15906" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-15906" }, { "cve": "CVE-2018-15473", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15473" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-15473" }, { "cve": "CVE-2018-20685", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-1552", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be \u0027/usr/local\u0027. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of \u0027C:/usr/local\u0027, which may be world writable, which enables untrusted users to modify OpenSSL\u0027s default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, \u0027/usr/local/ssl\u0027 is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1552" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1552" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6109" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6110" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6111" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6111" }, { "cve": "CVE-2019-16905", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16905" } ] }
rhsa-2015_1115
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nAn invalid free flaw was found in the way OpenSSL handled certain DTLS\nhandshake messages. A malicious DTLS client or server could cause a DTLS\nserver or client using OpenSSL to crash or, potentially, execute arbitrary\ncode. (CVE-2014-8176)\n\nA flaw was found in the way the OpenSSL packages shipped with Red Hat\nEnterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes()\nfunction. This issue could possibly cause a multi-threaded application\nusing OpenSSL to perform an out-of-bounds read and crash. (CVE-2015-3216)\n\nAn out-of-bounds read flaw was found in the X509_cmp_time() function of\nOpenSSL. A specially crafted X.509 certificate or a Certificate Revocation\nList (CRL) could possibly cause a TLS/SSL server or client using OpenSSL\nto crash. (CVE-2015-1789)\n\nA race condition was found in the session handling code of OpenSSL. This\nissue could possibly cause a multi-threaded TLS/SSL client using OpenSSL\nto double free session ticket data and crash. (CVE-2015-1791)\n\nA flaw was found in the way OpenSSL handled Cryptographic Message Syntax\n(CMS) messages. A CMS message with an unknown hash function identifier\ncould cause an application using OpenSSL to enter an infinite loop. \n(CVE-2015-1792)\n\nA NULL pointer dereference was found in the way OpenSSL handled certain\nPKCS#7 inputs. A specially crafted PKCS#7 input with missing\nEncryptedContent data could cause an application using OpenSSL to crash.\n(CVE-2015-1790)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and\nCVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan\nFratric as the original reporters of CVE-2014-8176, Robert Swiecki and\nHanno B\u00f6ck as the original reporters of CVE-2015-1789, Michal Zalewski as\nthe original reporter of CVE-2015-1790, Emilia K\u00e4sper as the original\nreport of CVE-2015-1791 and Johannes Bauer as the original reporter of\nCVE-2015-1792.\n\nAll openssl users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1115", "url": "https://access.redhat.com/errata/RHSA-2015:1115" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20150611.txt", "url": "https://www.openssl.org/news/secadv_20150611.txt" }, { "category": "external", "summary": "1227574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227574" }, { "category": "external", "summary": "1228603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228603" }, { "category": "external", "summary": "1228604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228604" }, { "category": "external", "summary": "1228607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228607" }, { "category": "external", "summary": "1228608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228608" }, { "category": "external", "summary": "1228611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228611" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1115.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T09:16:08+00:00", "generator": { "date": "2024-11-22T09:16:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1115", "initial_release_date": "2015-06-15T20:48:46+00:00", "revision_history": [ { "date": "2015-06-15T20:48:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-15T20:48:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:16:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "product": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "product_id": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el7_1.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "product": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "product_id": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-42.el7_1.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "product_id": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el7_1.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "product": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "product_id": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el7_1.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "product": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "product_id": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el7_1.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "product": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "product_id": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el7_1.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "product": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "product_id": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "product_id": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "product": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "product_id": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el7_1.8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "product": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "product_id": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el7_1.8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "product": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "product_id": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-42.el7_1.8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "product": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "product_id": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el7_1.8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.11.i686", "product": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686", "product_id": "openssl-0:1.0.1e-30.el6_6.11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.11?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.11?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.11?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.11?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "product_id": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.11?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "product": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "product_id": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el7_1.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-42.el7_1.8.s390x", "product": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x", "product_id": "openssl-1:1.0.1e-42.el7_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el7_1.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "product": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "product_id": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el7_1.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "product": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "product_id": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-42.el7_1.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "product": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "product_id": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el7_1.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "product": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "product_id": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el7_1.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.11.s390x", "product": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x", "product_id": "openssl-0:1.0.1e-30.el6_6.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "product_id": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.11?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "product": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "product_id": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el7_1.8?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "product": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "product_id": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el7_1.8?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "product": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "product_id": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-42.el7_1.8?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "product": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "product_id": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el7_1.8?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.11?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.11.s390", "product": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390", "product_id": "openssl-0:1.0.1e-30.el6_6.11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.11?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.11?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "product": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "product_id": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-42.el7_1.8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "product": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "product_id": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el7_1.8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "product_id": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el7_1.8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "product": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "product_id": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el7_1.8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "product": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "product_id": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el7_1.8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "product": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "product_id": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el7_1.8?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "product": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "product_id": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "product_id": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.11?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "product": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "product_id": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-42.el7_1.8?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "product": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "product_id": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el7_1.8?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "product": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "product_id": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el7_1.8?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "product": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "product_id": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el7_1.8?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.11.ppc", "product": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc", "product_id": "openssl-0:1.0.1e-30.el6_6.11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.11?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-42.el7_1.8.src", "product": { "name": "openssl-1:1.0.1e-42.el7_1.8.src", "product_id": "openssl-1:1.0.1e-42.el7_1.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el7_1.8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.11.src", "product": { "name": "openssl-0:1.0.1e-30.el6_6.11.src", "product_id": "openssl-0:1.0.1e-30.el6_6.11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.11?arch=src" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-42.ael7b_1.8.src", "product": { "name": "openssl-1:1.0.1e-42.ael7b_1.8.src", "product_id": "openssl-1:1.0.1e-42.ael7b_1.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.ael7b_1.8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "product": { "name": "openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_id": "openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.ael7b_1.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "product": { "name": "openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_id": "openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-42.ael7b_1.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "product": { "name": "openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_id": "openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.ael7b_1.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "product": { "name": "openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_id": "openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.ael7b_1.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "product": { "name": "openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_id": "openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.ael7b_1.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "product": { "name": "openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_id": "openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.ael7b_1.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.src", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.src", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.src", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.src", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.src", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.src", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.src", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.src", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.src", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.ael7b_1.8.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.ael7b_1.8.src", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.src", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.ael7b_1.8.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.ael7b_1.8.src", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.src", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.src", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.i686", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2014-8176", "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228611" } ], "notes": [ { "category": "description", "text": "An invalid-free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could send a specially crafted message to the peer, which could cause the application to crash or potentially result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Invalid free in DTLS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does NOT affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8176" }, { "category": "external", "summary": "RHBZ#1228611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-15T20:48:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1115" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: Invalid free in DTLS" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2015-1789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228603" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL, which is used to test the expiry dates of SSL/TLS certificates. An attacker could possibly use a specially crafted SSL/TLS certificate or CRL (Certificate Revocation List), which when parsed by an application would cause that application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: out-of-bounds read in X509_cmp_time", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1789" }, { "category": "external", "summary": "RHBZ#1228603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228603" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-15T20:48:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1115" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: out-of-bounds read in X509_cmp_time" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2015-1790", "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228604" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. An attacker able to make an application using OpenSSL verify, decrypt, or parse a specially crafted PKCS#7 input could cause that application to crash. TLS/SSL clients and servers using OpenSSL were not affected by this flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: PKCS7 crash with missing EnvelopedContent", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1790" }, { "category": "external", "summary": "RHBZ#1228604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228604" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1790", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-15T20:48:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1115" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: PKCS7 crash with missing EnvelopedContent" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2015-1791", "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228608" } ], "notes": [ { "category": "description", "text": "A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Race condition handling NewSessionTicket", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does NOT affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1791" }, { "category": "external", "summary": "RHBZ#1228608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1791", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1791" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-15T20:48:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1115" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Race condition handling NewSessionTicket" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2015-1792", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228607" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL verified certain signed messages using CMS (Cryptographic Message Syntax). A remote attacker could cause an application using OpenSSL to use excessive amounts of memory by sending a specially crafted message for verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: CMS verify infinite loop with unknown hash function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does NOT affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1792" }, { "category": "external", "summary": "RHBZ#1228607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1792", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1792" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-15T20:48:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1115" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: CMS verify infinite loop with unknown hash function" }, { "cve": "CVE-2015-3216", "discovery_date": "2015-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1227574" } ], "notes": [ { "category": "description", "text": "A regression was found in the ssleay_rand_bytes() function in the versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7. This regression could cause a multi-threaded application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Crash in ssleay_rand_bytes due to locking regression", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3216" }, { "category": "external", "summary": "RHBZ#1227574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227574" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3216", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3216" } ], "release_date": "2015-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-15T20:48:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1115" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.11.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.11.x86_64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Client-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Client-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7ComputeNode-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7ComputeNode-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Server-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Server-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-1:1.0.1e-42.ael7b_1.8.src", "7Server-optional-LE-7.1.Z:openssl-debuginfo-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-devel-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-libs-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-perl-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Server-optional-LE-7.1.Z:openssl-static-1:1.0.1e-42.ael7b_1.8.ppc64le", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.src", "7Workstation-optional-7.1.Z:openssl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-debuginfo-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-devel-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-libs-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-perl-1:1.0.1e-42.el7_1.8.x86_64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.i686", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.ppc64", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.s390x", "7Workstation-optional-7.1.Z:openssl-static-1:1.0.1e-42.el7_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Crash in ssleay_rand_bytes due to locking regression" } ] }
rhsa-2015_1197
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nAn out-of-bounds read flaw was found in the X509_cmp_time() function of\nOpenSSL. A specially crafted X.509 certificate or a Certificate Revocation\nList (CRL) could possibly cause a TLS/SSL server or client using OpenSSL\nto crash. (CVE-2015-1789)\n\nA NULL pointer dereference was found in the way OpenSSL handled certain\nPKCS#7 inputs. A specially crafted PKCS#7 input with missing\nEncryptedContent data could cause an application using OpenSSL to crash.\n(CVE-2015-1790)\n\nA flaw was found in the way the TLS protocol composes the Diffie-Hellman \n(DH) key exchange. A man-in-the-middle attacker could use this flaw to \nforce the use of weak 512 bit export-grade keys during the key exchange, \nallowing them to decrypt all traffic. (CVE-2015-4000)\n\nNote: This update forces the TLS/SSL client implementation in OpenSSL to \nreject DH key sizes below 768 bits, which prevents sessions to be \ndowngraded to export-grade keys. Future updates may raise this limit to \n1024 bits.\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2015-1789\nand CVE-2015-1790. Upstream acknowledges Robert Swiecki and Hanno B\u00f6ck as\nthe original reporters of CVE-2015-1789, and Michal Zalewski as the\noriginal reporter of CVE-2015-1790.\n\nAll openssl users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1197", "url": "https://access.redhat.com/errata/RHSA-2015:1197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20150611.txt", "url": "https://www.openssl.org/news/secadv_20150611.txt" }, { "category": "external", "summary": "1223211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211" }, { "category": "external", "summary": "1228603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228603" }, { "category": "external", "summary": "1228604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228604" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1197.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T09:16:14+00:00", "generator": { "date": "2024-11-22T09:16:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1197", "initial_release_date": "2015-06-30T04:42:32+00:00", "revision_history": [ { "date": "2015-06-30T04:42:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-06-30T04:42:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:16:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-36.el5_11.x86_64", "product": { "name": "openssl-devel-0:0.9.8e-36.el5_11.x86_64", "product_id": "openssl-devel-0:0.9.8e-36.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-36.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.x86_64", "product": { "name": "openssl-0:0.9.8e-36.el5_11.x86_64", "product_id": "openssl-0:0.9.8e-36.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "product_id": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-36.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-36.el5_11.x86_64", "product": { "name": "openssl-perl-0:0.9.8e-36.el5_11.x86_64", "product_id": "openssl-perl-0:0.9.8e-36.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-36.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.i686", "product": { "name": "openssl-0:0.9.8e-36.el5_11.i686", "product_id": "openssl-0:0.9.8e-36.el5_11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "product": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "product_id": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-36.el5_11?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "product": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "product_id": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-36.el5_11?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-36.el5_11.i386", "product": { "name": "openssl-devel-0:0.9.8e-36.el5_11.i386", "product_id": "openssl-devel-0:0.9.8e-36.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-36.el5_11?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.i386", "product": { "name": "openssl-0:0.9.8e-36.el5_11.i386", "product_id": "openssl-0:0.9.8e-36.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-36.el5_11.i386", "product": { "name": "openssl-perl-0:0.9.8e-36.el5_11.i386", "product_id": "openssl-perl-0:0.9.8e-36.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-36.el5_11?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.src", "product": { "name": "openssl-0:0.9.8e-36.el5_11.src", "product_id": "openssl-0:0.9.8e-36.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.ia64", "product": { "name": "openssl-0:0.9.8e-36.el5_11.ia64", "product_id": "openssl-0:0.9.8e-36.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-36.el5_11.ia64", "product": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ia64", "product_id": "openssl-devel-0:0.9.8e-36.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-36.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-36.el5_11.ia64", "product": { "name": "openssl-perl-0:0.9.8e-36.el5_11.ia64", "product_id": "openssl-perl-0:0.9.8e-36.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-36.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "product": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "product_id": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-36.el5_11?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc64", "product": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc64", "product_id": "openssl-devel-0:0.9.8e-36.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-36.el5_11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "product_id": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-36.el5_11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.ppc64", "product": { "name": "openssl-0:0.9.8e-36.el5_11.ppc64", "product_id": "openssl-0:0.9.8e-36.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "product": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "product_id": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-36.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.ppc", "product": { "name": "openssl-0:0.9.8e-36.el5_11.ppc", "product_id": "openssl-0:0.9.8e-36.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-36.el5_11.ppc", "product": { "name": "openssl-perl-0:0.9.8e-36.el5_11.ppc", "product_id": "openssl-perl-0:0.9.8e-36.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-36.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc", "product": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc", "product_id": "openssl-devel-0:0.9.8e-36.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-36.el5_11?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.s390", "product": { "name": "openssl-0:0.9.8e-36.el5_11.s390", "product_id": "openssl-0:0.9.8e-36.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-36.el5_11.s390", "product": { "name": "openssl-devel-0:0.9.8e-36.el5_11.s390", "product_id": "openssl-devel-0:0.9.8e-36.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-36.el5_11?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "product": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "product_id": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-36.el5_11?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-36.el5_11.s390x", "product": { "name": "openssl-0:0.9.8e-36.el5_11.s390x", "product_id": "openssl-0:0.9.8e-36.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-36.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-36.el5_11.s390x", "product": { "name": "openssl-devel-0:0.9.8e-36.el5_11.s390x", "product_id": "openssl-devel-0:0.9.8e-36.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-36.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "product": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "product_id": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-36.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-36.el5_11.s390x", "product": { "name": "openssl-perl-0:0.9.8e-36.el5_11.s390x", "product_id": "openssl-perl-0:0.9.8e-36.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-36.el5_11?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.i686", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.src", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-36.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-36.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2015-1789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228603" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL, which is used to test the expiry dates of SSL/TLS certificates. An attacker could possibly use a specially crafted SSL/TLS certificate or CRL (Certificate Revocation List), which when parsed by an application would cause that application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: out-of-bounds read in X509_cmp_time", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1789" }, { "category": "external", "summary": "RHBZ#1228603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228603" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-30T04:42:32+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1197" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: out-of-bounds read in X509_cmp_time" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2015-1790", "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228604" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. An attacker able to make an application using OpenSSL verify, decrypt, or parse a specially crafted PKCS#7 input could cause that application to crash. TLS/SSL clients and servers using OpenSSL were not affected by this flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: PKCS7 crash with missing EnvelopedContent", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1790" }, { "category": "external", "summary": "RHBZ#1228604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228604" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1790", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-30T04:42:32+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1197" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: PKCS7 crash with missing EnvelopedContent" }, { "cve": "CVE-2015-4000", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1223211" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites). An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation. This can lead to a passive man-in-the-middle attack in which the attacker is able to decrypt all traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of openssl and nss libraries as shipped with Red Hat Enterprise Linux 4, 5, 6 and 7. More information about this flaw is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c4 and https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c5.\n\nRed Hat Enterprise Linux 4 is in Extended Life Cycle phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 4.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4000" }, { "category": "external", "summary": "RHBZ#1223211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4000", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4000" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000" }, { "category": "external", "summary": "https://access.redhat.com/articles/1456263", "url": "https://access.redhat.com/articles/1456263" }, { "category": "external", "summary": "https://weakdh.org/", "url": "https://weakdh.org/" } ], "release_date": "2015-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-06-30T04:42:32+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1197" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-36.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-36.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks" } ] }
var-201506-0498
Vulnerability from variot
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to cause a denial-of-service condition. The following are vulnerable: OpenSSL 1.0.2 prior to 1.0.2b OpenSSL 1.0.1 prior to 1.0.1n OpenSSL 1.0.0 prior to 1.0.0s OpenSSL 0.9.8 prior to 0.9.8zg. The following firmware versions of Virtual Connect (VC) are impacted:
HPE BladeSystem c-Class Virtual Connect (VC) Firmware 4.30 through VC 4.45 HPE BladeSystem c-Class Virtual Connect (VC) Firmware 3.62 through VC 4.21
Note: Firmware versions 3.62 through 4.21 are not impacted by CVE-2016-0800, CVE-2015-3194, CVE-2014-3566, CVE-2015-0705, CVE-2016-0799, and CVE-2016-2842.
Release Date: 2015-08-05 Last Updated: 2015-08-05
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running OpenSSL with SSL/TLS enabled.
References:
CVE-2015-4000: DHE man-in-the-middle protection (Logjam).
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-1788 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1789 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1790 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1791 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2015-1792 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1793 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided an updated version of OpenSSL to resolve this vulnerability.
A new B.11.31 depot for OpenSSL_A.01.00.01p is available here:
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =OPENSSL11I
MANUAL ACTIONS: Yes - Update
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.31
openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.01.00.01p or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 5 August 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ============================================================================ Ubuntu Security Notice USN-2639-1 June 11, 2015
openssl vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in OpenSSL. (CVE-2014-8176)
Joseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed ECParameters structures.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.04: libssl1.0.0 1.0.1f-1ubuntu11.4
Ubuntu 14.10: libssl1.0.0 1.0.1f-1ubuntu9.8
Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.15
Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.31
After a standard system update you need to reboot your computer to make all the necessary changes. Corrected: 2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE) 2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12) 2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE) 2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16) 2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE) 2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30) CVE Name: CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 CVE-2015-1792, CVE-2015-4000
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
FreeBSD includes software from the OpenSSL Project.
II. [CVE-2015-1791]
The OpenSSL advisory also describes a problem that is identified as CVE-2014-8176, which is already fixed by an earlier FreeBSD Errata Notice, FreeBSD-EN-15:02.openssl.
III. [CVE-2015-4000]. [CVE-2015-1788]. This affects FreeBSD 10.1 only, as the problem was no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]
An attacker may be able to crash multi-thread applications that supports resumed TLS handshakes. [CVE-2015-1791]
IV. Workaround
No workaround is available.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.
2) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:
freebsd-update fetch
freebsd-update install
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
[FreeBSD 10.1]
fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch
fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc
gpg --verify openssl-10.1.patch.asc
[FreeBSD 9.3 and 8.4]
fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch
fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc
gpg --verify openssl-8.4.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in
Restart all deamons using the library, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/8/ r284286 releng/8.4/ r284295 stable/9/ r284286 releng/9.3/ r284295 stable/10/ r284285 releng/10.1/ r284295
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
VII. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openssl security update Advisory ID: RHSA-2015:1115-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1115.html Issue date: 2015-06-15 CVE Names: CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-3216 =====================================================================
- Summary:
Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.
An invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. (CVE-2014-8176)
A flaw was found in the way the OpenSSL packages shipped with Red Hat Enterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes() function. (CVE-2015-3216)
An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789)
A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. (CVE-2015-1791)
A flaw was found in the way OpenSSL handled Cryptographic Message Syntax (CMS) messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. (CVE-2015-1792)
A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790)
Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and CVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan Fratric as the original reporters of CVE-2014-8176, Robert Swiecki and Hanno Böck as the original reporters of CVE-2015-1789, Michal Zalewski as the original reporter of CVE-2015-1790, Emilia Käsper as the original report of CVE-2015-1791 and Johannes Bauer as the original reporter of CVE-2015-1792.
All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression 1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time 1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent 1228607 - CVE-2015-1792 OpenSSL: CMS verify infinite loop with unknown hash function 1228608 - CVE-2015-1791 OpenSSL: Race condition handling NewSessionTicket 1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: openssl-1.0.1e-30.el6_6.11.src.rpm
i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm
x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: openssl-1.0.1e-30.el6_6.11.src.rpm
x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: openssl-1.0.1e-30.el6_6.11.src.rpm
i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm
ppc64: openssl-1.0.1e-30.el6_6.11.ppc.rpm openssl-1.0.1e-30.el6_6.11.ppc64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.ppc.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm openssl-devel-1.0.1e-30.el6_6.11.ppc.rpm openssl-devel-1.0.1e-30.el6_6.11.ppc64.rpm
s390x: openssl-1.0.1e-30.el6_6.11.s390.rpm openssl-1.0.1e-30.el6_6.11.s390x.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.s390.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm openssl-devel-1.0.1e-30.el6_6.11.s390.rpm openssl-devel-1.0.1e-30.el6_6.11.s390x.rpm
x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm
ppc64: openssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm openssl-perl-1.0.1e-30.el6_6.11.ppc64.rpm openssl-static-1.0.1e-30.el6_6.11.ppc64.rpm
s390x: openssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm openssl-perl-1.0.1e-30.el6_6.11.s390x.rpm openssl-static-1.0.1e-30.el6_6.11.s390x.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: openssl-1.0.1e-30.el6_6.11.src.rpm
i386: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm
x86_64: openssl-1.0.1e-30.el6_6.11.i686.rpm openssl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.11.i686.rpm openssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm openssl-perl-1.0.1e-30.el6_6.11.i686.rpm openssl-static-1.0.1e-30.el6_6.11.i686.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm openssl-static-1.0.1e-30.el6_6.11.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: openssl-1.0.1e-42.el7_1.8.src.rpm
x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: openssl-1.0.1e-42.el7_1.8.src.rpm
x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: openssl-1.0.1e-42.el7_1.8.src.rpm
ppc64: openssl-1.0.1e-42.el7_1.8.ppc64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm openssl-devel-1.0.1e-42.el7_1.8.ppc.rpm openssl-devel-1.0.1e-42.el7_1.8.ppc64.rpm openssl-libs-1.0.1e-42.el7_1.8.ppc.rpm openssl-libs-1.0.1e-42.el7_1.8.ppc64.rpm
s390x: openssl-1.0.1e-42.el7_1.8.s390x.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm openssl-devel-1.0.1e-42.el7_1.8.s390.rpm openssl-devel-1.0.1e-42.el7_1.8.s390x.rpm openssl-libs-1.0.1e-42.el7_1.8.s390.rpm openssl-libs-1.0.1e-42.el7_1.8.s390x.rpm
x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: openssl-1.0.1e-42.ael7b_1.8.src.rpm
ppc64le: openssl-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-devel-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-libs-1.0.1e-42.ael7b_1.8.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: openssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm openssl-perl-1.0.1e-42.el7_1.8.ppc64.rpm openssl-static-1.0.1e-42.el7_1.8.ppc.rpm openssl-static-1.0.1e-42.el7_1.8.ppc64.rpm
s390x: openssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm openssl-perl-1.0.1e-42.el7_1.8.s390x.rpm openssl-static-1.0.1e-42.el7_1.8.s390.rpm openssl-static-1.0.1e-42.el7_1.8.s390x.rpm
x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64le: openssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-perl-1.0.1e-42.ael7b_1.8.ppc64le.rpm openssl-static-1.0.1e-42.ael7b_1.8.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: openssl-1.0.1e-42.el7_1.8.src.rpm
x86_64: openssl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-devel-1.0.1e-42.el7_1.8.i686.rpm openssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm openssl-libs-1.0.1e-42.el7_1.8.i686.rpm openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm openssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm openssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm openssl-static-1.0.1e-42.el7_1.8.i686.rpm openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2014-8176 https://access.redhat.com/security/cve/CVE-2015-1789 https://access.redhat.com/security/cve/CVE-2015-1790 https://access.redhat.com/security/cve/CVE-2015-1791 https://access.redhat.com/security/cve/CVE-2015-1792 https://access.redhat.com/security/cve/CVE-2015-3216 https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv_20150611.txt
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFVf0NNXlSAg2UNWIIRArL4AJ9e7lbD/4Nks5midR5o3E4Bs5lQWQCgnrvk ZyXizCcFL9oAQexObjxp/Mo= =PXiY -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. 5 client) - i386, x86_64
- (CVE-2015-1790)
A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. (CVE-2015-4000)
Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. OpenSSL Security Advisory [11 Jun 2015] =======================================
DHE man-in-the-middle protection (Logjam)
A vulnerability in the TLS protocol allows a man-in-the-middle attacker to downgrade vulnerable TLS connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. This vulnerability is known as Logjam (CVE-2015-4000).
OpenSSL has added protection for TLS clients by rejecting handshakes with DH parameters shorter than 768 bits. This limit will be increased to 1024 bits in a future release.
Malformed ECParameters causes infinite loop (CVE-2015-1788)
Severity: Moderate
When processing an ECParameters structure OpenSSL enters an infinite loop if the curve specified is over a specially malformed binary polynomial field.
This can be used to perform denial of service against any system which processes public keys, certificate requests or certificates. This includes TLS clients and TLS servers with client authentication enabled.
This issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent 1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are affected.
OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s OpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg
This issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The fix was developed by Andy Polyakov of the OpenSSL development team.
Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
Severity: Moderate
X509_cmp_time does not properly check the length of the ASN1_TIME string and can read a few bytes out of bounds. In addition, X509_cmp_time accepts an arbitrary number of fractional seconds in the time string.
An attacker can use this to craft malformed certificates and CRLs of various sizes and potentially cause a segmentation fault, resulting in a DoS on applications that verify certificates or CRLs. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg
This issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki (Google), and independently on 11th April 2015 by Hanno Böck. The fix was developed by Emilia Käsper of the OpenSSL development team.
PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
Severity: Moderate
The PKCS#7 parsing code does not handle missing inner EncryptedContent correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing.
Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg
This issue was reported to OpenSSL on 18th April 2015 by Michal Zalewski (Google). The fix was developed by Emilia Käsper of the OpenSSL development team.
This can be used to perform denial of service against any system which verifies signedData messages using the CMS code.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg
This issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The fix was developed by Dr. Stephen Henson of the OpenSSL development team.
This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. The fix was developed by Matt Caswell of the OpenSSL development team. It existed in previous OpenSSL versions and was fixed in June 2014.
If a DTLS peer receives application data between the ChangeCipherSpec and Finished messages, buffering of such data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption.
This issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8.
OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.
This issue was originally reported on March 28th 2014 in https://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen Kariyanahalli, and subsequently by Ivan Fratric and Felix Groebert (Google). A fix was developed by zhu qun-ying.
The fix for this issue can be identified by commits bcc31166 (1.0.1), b79e6e3a (1.0.0) and 4b258e73 (0.9.8).
Note
As per our previous announcements and our Release Strategy (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions 1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these releases will be provided after that date. Users of these releases are advised to upgrade.
References
URL for this Security Advisory: https://www.openssl.org/news/secadv_20150611.txt
Note: the online version of the advisory may be updated with additional details over time.
For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0498", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "15.1" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "8.3" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 1.1, "vendor": "oracle", "version": "8.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0p" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0q" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0o" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0n" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0r" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0e" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.8zf" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2" }, { "model": "sparc-opl service processor", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "1121" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1f" }, { "model": "junos 12.1x44-d20", "scope": null, "trust": 0.9, "vendor": "juniper", "version": null }, { "model": "istorage", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "hs series all versions" }, { "model": "hpe systems insight manager", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "foundation v8.2 to v8.5" }, { "model": "enterprisedirectoryserver", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "6.1" }, { "model": "peoplesoft products", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "of peoplesoft enterprise peopletools 8.54" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v3.0" }, { "model": "enterprisedirectoryserver", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "ver6.0" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v6.2" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "st ard-j edition v7.1 to v8.1" }, { "model": "hpe matrix operating environment", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v7.1" }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "1.0.0s" }, { "model": "enterprisedirectoryserver", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "7.0" }, { "model": "webotx", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "st ard edition v4.2 to v6.5" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "mcoperations ver3.6.2 to ver4.2" }, { "model": "openssl", "scope": "lt", "trust": 0.8, "vendor": "openssl", "version": "1.0.2" }, { "model": "ix3000 series", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "ip38x/5000", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "all revisions" }, { "model": "capssuite", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v3.0 to v4.0 manager component" }, { "model": "secureware/pki application development kit", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "ver3.01" }, { "model": "mysql", "scope": "lte", "trust": 0.8, "vendor": "oracle", "version": "5.6.25 and earlier" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "express v8.2 to v9.2" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.10 to 10.10.4" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v3.1" }, { "model": "univerge", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "3c ucm" }, { "model": "e-business suite", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.5.10.2" }, { "model": "hpe insight control", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "none" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "/sg series sg3600lm/lg/lj v6.1" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "systemmanager ver5.5.2 to ver6.2.1" }, { "model": "ip38x/3500", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "all revisions" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "st ard v8.2 to v9.2" }, { "model": "istorage", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "nv7500/nv5500/nv3500 series" }, { "model": "istorage", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "nv7400/nv5400/nv3400 series" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v4.0" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "web edition v7.1 to v8.1" }, { "model": "fusion middleware", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "of oracle exalogic infrastructure eecs 2.0.6.2.3" }, { "model": "webotx", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "uddi registry v1.1 to v7.1" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "application navigator probe option ver3.1.0.x to ver4.1.0.x" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v8.0" }, { "model": "secureware/pki application development kit", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "ver3.02" }, { "model": "univerge", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "3c cmm" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise v8.2 to v9.2" }, { "model": "webotx", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise edition v4.2 to v6.5" }, { "model": "hpe server migration pack", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "st ard edition v7.1" }, { "model": "xcp", "scope": "lt", "trust": 0.8, "vendor": "oracle", "version": "(sparc enterprise m3000/m4000/m5000/m8000/m9000 server )" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise edition v7.1" }, { "model": "peoplesoft products", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "of peoplesoft enterprise peopletools 8.53" }, { "model": "hpe version control repository manager", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "/sg series intersecvm/sg v1.2" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v7.0" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "jobcenter r14.1" }, { "model": "ip38x/810", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "all revisions" }, { "model": "webotx", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "st ard-j edition v4.1 to v6.5" }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "1.0.2b" }, { "model": "hpe insight control", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "server provisioning" }, { "model": "xcp", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "1121" }, { "model": "supply chain products suite", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "of oracle transportation management 6.2" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.9.5" }, { "model": "webotx sip application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "st ard edition v7.1 to v8.1" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.8.5" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "application navigator agent ver3.3 to ver4.1" }, { "model": "openssl", "scope": "lt", "trust": 0.8, "vendor": "openssl", "version": "1.0.1" }, { "model": "ix2000 series", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "secureware/pki application development kit", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "ver3.0" }, { "model": "openssl", "scope": "lt", "trust": 0.8, "vendor": "openssl", "version": "1.0.0" }, { "model": "supply chain products suite", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "of oracle transportation management 6.1" }, { "model": "webotx", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "web edition v4.1 to v6.5" }, { "model": "webotx enterprise service bus", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v6.4 to v9.2" }, { "model": "ip38x/1210", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "all revisions" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "application navigator manager ver3.2.2 to ver4.1" }, { "model": "webotx portal", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v8.2 to v9.1" }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "1.0.1n" }, { "model": "enterprisedirectoryserver", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "8.0" }, { "model": "enterprisedirectoryserver", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "7.1" }, { "model": "system management homepage", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "secureware/pki application development kit", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "ver3.1" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "/sg series univerge sg3000lg/lj" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "junos 12.1x46-d25", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "sparc-opl service processor", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "1121" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.1" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2" }, { "model": "sparc enterprise m5000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.6" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.53" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "junos 12.1x44-d33", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.0.0" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.6" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.2" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.5" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "project openssl 1.0.0g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "worklight foundation enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.20" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.12" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.17" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.7" }, { "model": "imc products", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.1.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37001.1" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "security network intrusion prevention system gv200", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "junos 12.1x44-d50", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.4" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.15" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50001.1" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0.0.52" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "project openssl 1.0.1i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sdk for node.js for bluemix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0.10.38" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.12" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "project openssl 1.0.0h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl 1.0.1n", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.0" }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.20" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "qradar siem mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "security appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "junos 15.1r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.3" }, { "model": "security network controller 1.0.3350m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "project openssl 0.9.8y", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sparc enterprise m4000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.4.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.12" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.1.0" }, { "model": "abyp-2t-1s-1l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.68" }, { "model": "system networking rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.4.0" }, { "model": "fortimail", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.10" }, { "model": "abyp-10g-2sr-2lr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.4.2" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security proventia network enterprise scanner", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "security access manager for web appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.1" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.2" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.08" }, { "model": "worklight consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.4" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.3" }, { "model": "system networking rackswitch g8052", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.17" }, { "model": "exalogic infrastructure eecs", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.0.6.2.3" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.5" }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1.1" }, { "model": "infosphere master data management provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "abyp-10g-4lr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4.0.5" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.3" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.5.0.2" }, { "model": "junos 12.1x46-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.34" }, { "model": "sparc enterprise m9000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "project openssl 1.0.1f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.4.1" }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.3.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.4.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.25" }, { "model": "messagesight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "comware products", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "70" }, { "model": "project openssl 1.0.0o", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.5" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.3" }, { "model": "fortianalyzer", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.9" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "flashsystem 9840-ae2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3387" }, { "model": "abyp-10g-4sr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "enterprise session border controller ecz7.3m2p2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "ds8870 r7.5", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "sdk for node.js for bluemix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0.12.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4.0.5" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.0" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.213" }, { "model": "qradar siem mr2 patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.18" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.2" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.4.0.4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "fortivoice enterprise", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.0.6" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.7" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.28" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.19" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.1" }, { "model": "junos 12.1x44-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.9.3" }, { "model": "junos 12.1x46-d55", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "system networking rackswitch g8124", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.11.5.0" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "ip office application server sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.01" }, { "model": "fortisandbox", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "2.0" }, { "model": "icewall sso dfw", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.7" }, { "model": "san volume controller", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.4.0.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.9" }, { "model": "junos 13.2x51-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.3" }, { "model": "enterprise content management system monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.1" }, { "model": "project openssl 1.0.0c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.3" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "3.1" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70007.3.0.12" }, { "model": "project openssl 1.0.0s", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "ip office application server sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.02" }, { "model": "junos 12.1x47-d45", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.4" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "sparc enterprise m5000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.5" }, { "model": "aura experience portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.2" }, { "model": "screenos 6.3.0r13", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "aura presence services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "fortiddos", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.1.5" }, { "model": "linux enterprise server sp4 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.5" }, { "model": "secure backup", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "12.1.0.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.13" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "version control repository manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "project openssl 0.9.8zf", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.7" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "abyp-0t-0s-4l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "qradar incident forensics mr3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.14" }, { "model": "flashsystem 9840-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3.0" }, { "model": "system networking rackswitch g8316", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "unified security management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "5.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1.0.6" }, { "model": "aura application server sip core pb5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "websphere mq for hp nonstop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.5.0.2" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.3.0.3" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.2" }, { "model": "worklight consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.18" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.1.3" }, { "model": "project openssl 0.9.8zc", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x47" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "infosphere guardium for applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.0" }, { "model": "server migration pack", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "rational application developer for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0.1" }, { "model": "worklight foundation consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.1" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.2" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "sparc enterprise m4000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35001.1" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.6" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.7" }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.1" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.3.0.1.0" }, { "model": "system networking rackswitch g8124", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.4.0" }, { "model": "flashsystem 9846-ac1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "qradar siem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.3" }, { "model": "fsso build", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "235" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "one-x client enablement services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "project openssl 0.9.8s", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.3" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.5" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.2" }, { "model": "security network controller 1.0.3376m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "operations agent", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "12.01" }, { "model": "matrix operating environment", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "junos 13.2x51-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "sparc enterprise m8000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "mobilefirst platform foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.14" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v50007.4.0.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1.0.6" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "junos 12.1x46-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "junos 12.1x44-d32", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl 1.0.1l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.5" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "systems insight manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "sparc enterprise m3000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "junos 12.3r10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.214" }, { "model": "project openssl 1.0.1h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2.0.5" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.0" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.2" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.211" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0.2" }, { "model": "hp-ux b.11.22", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6" }, { "model": "insight orchestration", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "insight orchestration", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "junos 14.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "version control agent", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v37007.3.0.12" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70007.4.0.6" }, { "model": "open source siem", "scope": "ne", "trust": 0.3, "vendor": "alienvault", "version": "5.0.4" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "worklight foundation consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.20" }, { "model": "junos 13.3r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "abyp-4tl-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "cms r16.3", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1209" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "netinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0" }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.5.0.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4.19" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3361" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "12.0" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "workflow for bluemix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "filenet system monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "junos 12.1x44-d34", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "sterling connect:direct for hp nonstop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.2.77" }, { "model": "junos 14.1r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2.27" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.1.8" }, { "model": "linux enterprise server sp2 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "command center appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "security network intrusion prevention system gv1000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.0.3" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.33" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.5" }, { "model": "enterprise content management system monitor fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.2.02" }, { "model": "sterling connect:enterprise for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.4.03" }, { "model": "i v5r4", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4" }, { "model": "project openssl 0.9.8n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "abyp-2t-1s-1l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "icewall sso agent option", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2.0.3" }, { "model": "security network intrusion prevention system gv200", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "junos 14.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4.1.8" }, { "model": "system networking rackswitch g8264t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.14.0" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "junos 14.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.213" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.4" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.6" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "i v5r3", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "project openssl 1.0.2b", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system networking rackswitch g8052", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.11.5.0" }, { "model": "one-x client enablement services sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "screenos 6.3.0r19", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.8.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.1" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.01" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.14" }, { "model": "abyp-2t-2s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.7" }, { "model": "junos 12.1x46-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.4" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2.0.8" }, { "model": "abyp-0t-4s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.15" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.213" }, { "model": "systems insight manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "rational application developer for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1.0.6" }, { "model": "hp-ux b.11.11.16.09", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.4" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.07" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.38" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.12" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "system networking rackswitch g8124-e", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.11.5.0" }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.41" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.5" }, { "model": "aura utility services sp7", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v50007.3.0.12" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3.3" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "fortirecorder", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "2.0.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.2" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "flashsystem 9848-ac1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.6.1" }, { "model": "abyp-2t-0s-2l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "15.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.16" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.14" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "version control repository manager 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system networking rackswitch g8264t", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.4.0" }, { "model": "one-x client enablement services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "flashsystem 9846-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v37007.4.0.6" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.3" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "junos 12.1x46-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.8.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.15" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.4" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.0" }, { "model": "system networking rackswitch g8264", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "project openssl 1.0.0e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "junos 12.1x47-d11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.35" }, { "model": "websphere mq", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "junos d25", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos 12.3r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "unified security management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.14" }, { "model": "project openssl 0.9.8zg", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos 13.2x51-d40", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "project openssl 0.9.8t", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sparc enterprise m8000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "abyp-0t-4s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "qradar siem mr3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.8" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.7" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.5" }, { "model": "transportation management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.1" }, { "model": "insight orchestration", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.1.3" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.210" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "enterprise content management system monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.13" }, { "model": "project openssl 1.0.1m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "fortimanager", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.9" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3.0.5" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.16" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.3" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "security network intrusion prevention system gv1000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.3" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1.0.7" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "5.0.3" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.10" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "security network intrusion prevention system gv200", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.1" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3.2" }, { "model": "security network intrusion prevention system gv200", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "abyp-10g-2sr-2lr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.5" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.13" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.8" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "project openssl 1.0.0r", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2.0" }, { "model": "aura conferencing sp7", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3376" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.3.0.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.11" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.23" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "workload deployer if9", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.010" }, { "model": "aura system manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.0.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "junos 12.3r9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2.0.5" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.12" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.212" }, { "model": "cognos insight standard edition fp if", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.2.124" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.6.0" }, { "model": "sparc enterprise m4000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "junos 12.1x44-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "hp-ux b.11.11.14.15", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.11" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.1" }, { "model": "fortiap", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.8" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "system networking rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.20.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.3" }, { "model": "fortiadc", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1.0.7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.12" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70007.5.0.3" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "security network intrusion prevention system gv1000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.12" }, { "model": "endpoint manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "bladesystem c-class virtual connect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.21" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "unified security management", "scope": "ne", "trust": 0.3, "vendor": "alienvault", "version": "5.0.4" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.15" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "netscaler service delivery appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.22" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.2.7" }, { "model": "junos 12.1x46-d36", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "hp-ux b.11.11.15.13", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "san volume controller", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.3" }, { "model": "qradar incident forensics patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.41" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v50007.5.0.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "session border controller for enterprise", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.0" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.7" }, { "model": "junos 12.1x47-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v35007.5.0.3" }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.4" }, { "model": "project openssl 1.0.0q", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl 0.9.8u", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.14" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "security access manager for web appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.6" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.15" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.12" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.1.3" }, { "model": "project openssl 1.0.0d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl 1.0.1e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "one-x client enablement services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "5.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.15" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.24" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "storwize unified", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "insight control server provisioning", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "hp-ux b.11.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "junos 12.1x44-d51", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "enterprise linux server eus 6.6.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.8" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "qradar incident forensics mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "project openssl 0.9.8m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.2" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.0" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "junos 12.3x48-d20", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "infosphere master data management patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.10" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.10" }, { "model": "junos d30", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.7" }, { "model": "sdk for node.js", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.3" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.16" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.3" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.03" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.1" }, { "model": "rational policy tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "qradar siem mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.4" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.9" }, { "model": "bladesystem c-class virtual connect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.30" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.3" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "junos 12.3r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gv1000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "endpoint manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "aura conferencing sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.9.1" }, { "model": "system networking rackswitch g8264cs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.11.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.3" }, { "model": "security network controller 1.0.3387m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "junos d40", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "junos 15.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network controller 1.0.3379m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "project openssl 0.9.8za", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "comware products", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "50" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "abyp-4ts-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "sterling connect:enterprise for unix ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.38" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.14" }, { "model": "project openssl 0.9.8q", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.8" }, { "model": "screenos 6.3.0r22", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4.0.5" }, { "model": "endpoint manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "transportation management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.21" }, { "model": "netinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.14" }, { "model": "cognos insight standard edition fp if", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.214" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "project openssl 1.0.2a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.16" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "junos 14.1r6", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.16" }, { "model": "project openssl 0.9.8g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "abyp-0t-2s-2l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3.0.10" }, { "model": "cms r17", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.17" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "project openssl 0.9.8ze", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.15" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.5" }, { "model": "worklight consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.7" }, { "model": "hp-ux b.11.23.1.007", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "unified security management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.0" }, { "model": "forticlient windows/mac", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.31" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.7" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "sterling connect:enterprise for unix ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.4.4.04" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v35007.4.0.6" }, { "model": "security network controller 1.0.3352m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security identity governance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "virtual connect enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "system networking rackswitch g8264", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.11.5.0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.6" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.0.1.12" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.13" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.0.0" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.7" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "hp-ux b.11.11.02.008", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.13" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3.0.5" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8x" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4.19" }, { "model": "abyp-10g-4sr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.10.2" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.1" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "junos 14.2r4", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.4" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.11" }, { "model": "powerkvm build", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.157" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.1" }, { "model": "virtual connect enterprise manager sdk", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "16.1" }, { "model": "junos 12.1x47-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos d25", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.8" }, { "model": "sparc enterprise m8000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.17" }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.24" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "vcx products", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "qradar incident forensics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "aura application server sip core pb3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.10" }, { "model": "security network controller 1.0.3381m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "project openssl 1.0.0f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "flashsystem 9843-ae2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.9" }, { "model": "sparc enterprise m3000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "system networking rackswitch g8264cs", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.5" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "project openssl 1.0.0b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1.0.5" }, { "model": "hp-ux b.11.11.17.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.11" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.01" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "sparc enterprise m9000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.6" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.6" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.03" }, { "model": "forticlient ios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.1" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v37007.5.0.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.41" }, { "model": "forticlient android", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.6" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "sonas", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.2" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.41" }, { "model": "hp-ux b.11.23.07.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system networking rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.14.0" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "aura conferencing sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.14" }, { "model": "project openssl 1.0.1d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.13" }, { "model": "abyp-4tl-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1.0.7" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.11" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.2" }, { "model": "project openssl 1.0.0p", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.12" }, { "model": "junos 12.1x46-d40", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.09" }, { "model": "rational developer for aix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.1" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "project openssl 1.0.0n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.0.3" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.25" }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1" }, { "model": "junos 15.1x49-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "insight control", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "sterling connect:direct for hp nonstop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.010" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "abyp-4t-0s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.41" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "virtual connect enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.3" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "aura experience portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v35007.3.0.12" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.10" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.5" }, { "model": "flashsystem 9848-ac0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.13" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "project openssl 1.0.1b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl 1.0.0k", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "bladesystem c-class virtual connect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.62" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.2" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system platform sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.5" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "junos 12.3x48-d30", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "sterling connect:direct for hp nonstop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.6" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.12" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.4" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3379" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "junos 13.2x51-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.16" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "endpoint manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.8" }, { "model": "aura conferencing sp6", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.2" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.05" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1.0.7" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.5.0.2" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.2" }, { "model": "junos 15.1x49-d20", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "fortiauthenticator", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.1" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "aura messaging sp4", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.7" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3.0.5" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.4" }, { "model": "sparc enterprise m5000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "15.04" }, { "model": "project openssl 1.0.0a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos 12.1x44-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "security network controller 1.0.3361m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "project openssl 1.0.1a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos 12.1x47-d25", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.2.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.13" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "ascenlink", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "7.2.3" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.16" }, { "model": "junos 12.1x44-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "sterling integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "netscaler t1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "project openssl 0.9.8zb", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.9" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.4.0.5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "junos 13.3r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.4" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "project openssl 0.9.8w", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos 12.1x47-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.4" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "5.0" }, { "model": "flashsystem 9843-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.27" }, { "model": "project openssl 1.0.0m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "project openssl 1.0.1g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "communications security gateway", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.0" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "junos 12.3x48-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flashsystem 9848-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "qradar siem patch ifix01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.44" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.16" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.210" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.9" }, { "model": "security appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.913" }, { "model": "system networking rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.14.0" }, { "model": "security appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.00" }, { "model": "filenet system monitor interim fix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.5.0.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.8" }, { "model": "junos 12.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gv200", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "mobilefirst platform foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "screenos 6.3.0r21", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4.19" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.6" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "aura communication manager ssp04", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "project openssl 0.9.8r", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.2.3" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4.1.8" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "project openssl 1.0.0l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "general parallel file system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.0" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise content management system monitor interim fix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.1.0.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.3" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.2" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "project openssl 0.9.8p", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos 13.3r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.54" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "sterling connect:enterprise for unix ifix03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.5" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.8" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.06" }, { "model": "junos 12.1x44-d55", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d30.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.6" }, { "model": "junos d20", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.07" }, { "model": "rational developer for i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "bladesystem c-class virtual connect", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.50" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.8" }, { "model": "abyp-10g-4lr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.6" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.13" }, { "model": "sparc enterprise m9000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rational application developer for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "security network intrusion prevention system gv200", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "qradar siem mr2 patch ifi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.110" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "project openssl 1.0.1c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1768" }, { "model": "abyp-0t-0s-4l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "unified security management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "5.0.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8v" }, { "model": "abyp-4t-0s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "hp-ux b.11.11.13.14", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.15" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.1.7" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3" }, { "model": "rational developer for aix and linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "abyp-0t-2s-2l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.34" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "screenos 6.3.0r12", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.3" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.64" }, { "model": "rational software architect for websphere software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.8" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.14" }, { "model": "project openssl 0.9.8l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.13" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.0.2.0" }, { "model": "san volume controller", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.12" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "junos 13.2x51-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "bladesystem c-class virtual connect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.45" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.17" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "junos 14.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl 1.0.0i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "junos d10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "flashsystem 9846-ac0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.0" }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1.11" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.16" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.21" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.13" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3.0" }, { "model": "virtual connect enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "system networking rackswitch g8332", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.7.21.0" }, { "model": "security network intrusion prevention system gv1000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.010" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "junos 12.3r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "sdk for node.js", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.15" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.12" }, { "model": "sparc enterprise m3000 xcp", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "1121" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.26" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.3" }, { "model": "security appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "junos d35", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3" }, { "model": "unified security management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.15" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.2" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "7" }, { "model": "qradar siem mr1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.37" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "junos 12.1x44-d40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.2" }, { "model": "project openssl 1.0.0j", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "security network intrusion prevention system gv1000", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "junos 12.1x46-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.9" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.3" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "aura presence services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.0.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2.0.3" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.19" }, { "model": "project openssl 1.0.1j", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cloudbridge", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4.1.8" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "version control repository manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.1" }, { "model": "junos 12.3x48-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3.0.5" }, { "model": "abyp-2t-2s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.0.3" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3381" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "operations agent", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "11.15" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1.0.6" }, { "model": "abyp-4ts-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.02" }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.23" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "junos 12.3r11", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.1" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "linux enterprise server sp1 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "5" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "screenos 6.3.0r20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "junos 13.3r7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "cognos insight standard edition fp", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.2.24" }, { "model": "forticache", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.0" }, { "model": "messagesight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "aura application server sip core sp10", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "project openssl 0.9.8zd", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.2" }, { "model": "junos 14.1r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.11" }, { "model": "project openssl 1.0.1k", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.9" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "project openssl 0.9.8o", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "mysql server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.16" }, { "model": "server migration pack", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.33" }, { "model": "sterling connect:enterprise for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.37" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.43" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "worklight foundation enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "predictiveinsight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "junos 12.1x44-d35.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.5" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "secure backup", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3.3.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "open source siem", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.14" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "operations agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.12" }, { "model": "insight orchestration", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "junos 14.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.10" }, { "model": "icewall mcrp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0" }, { "model": "abyp-2t-0s-2l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.14.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.32" }, { "model": "junos 13.2x51-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.8" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "rational team concert", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2.0.8" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "qradar siem mr2 patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.19" } ], "sources": [ { "db": "BID", "id": "75156" }, { "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "db": "CNNVD", "id": "CNNVD-201506-245" }, { "db": "NVD", "id": "CVE-2015-1789" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.8zf", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1121", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-1789" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Robert Swiecki(Google) and Hanno B\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;ouml;ck.", "sources": [ { "db": "BID", "id": "75156" } ], "trust": 0.3 }, "cve": "CVE-2015-1789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-1789", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-1789", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-1789", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201506-245", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-1789", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-1789" }, { "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "db": "CNNVD", "id": "CNNVD-201506-245" }, { "db": "NVD", "id": "CVE-2015-1789" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to cause a denial-of-service condition. \nThe following are vulnerable:\nOpenSSL 1.0.2 prior to 1.0.2b\nOpenSSL 1.0.1 prior to 1.0.1n\nOpenSSL 1.0.0 prior to 1.0.0s\nOpenSSL 0.9.8 prior to 0.9.8zg. \nThe following firmware versions of Virtual Connect (VC) are impacted:\n\nHPE BladeSystem c-Class Virtual Connect (VC) Firmware 4.30 through VC 4.45\nHPE BladeSystem c-Class Virtual Connect (VC) Firmware 3.62 through VC 4.21\n\nNote: Firmware versions 3.62 through 4.21 are not impacted by CVE-2016-0800,\nCVE-2015-3194, CVE-2014-3566, CVE-2015-0705, CVE-2016-0799, and\nCVE-2016-2842. \n\nRelease Date: 2015-08-05\nLast Updated: 2015-08-05\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP-UX running\nOpenSSL with SSL/TLS enabled. \n\nReferences:\n\nCVE-2015-4000: DHE man-in-the-middle protection (Logjam). \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2015-1788 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2015-1789 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2015-1790 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2015-1791 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2015-1792 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2015-1793 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided an updated version of OpenSSL to resolve this vulnerability. \n\nA new B.11.31 depot for OpenSSL_A.01.00.01p is available here:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=OPENSSL11I\n\nMANUAL ACTIONS: Yes - Update\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.01.00.01p or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 5 August 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. ============================================================================\nUbuntu Security Notice USN-2639-1\nJune 11, 2015\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.04\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. (CVE-2014-8176)\n\nJoseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed\nECParameters structures. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.04:\n libssl1.0.0 1.0.1f-1ubuntu11.4\n\nUbuntu 14.10:\n libssl1.0.0 1.0.1f-1ubuntu9.8\n\nUbuntu 14.04 LTS:\n libssl1.0.0 1.0.1f-1ubuntu2.15\n\nUbuntu 12.04 LTS:\n libssl1.0.0 1.0.1-4ubuntu5.31\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \nCorrected: 2015-06-11 19:07:45 UTC (stable/10, 10.1-STABLE)\n 2015-06-12 07:23:55 UTC (releng/10.1, 10.1-RELEASE-p12)\n 2015-06-11 19:39:27 UTC (stable/9, 9.3-STABLE)\n 2015-06-12 07:23:55 UTC (releng/9.3, 9.3-RELEASE-p16)\n 2015-06-11 19:39:27 UTC (stable/8, 8.4-STABLE)\n 2015-06-12 07:23:55 UTC (releng/8.4, 8.4-RELEASE-p30)\nCVE Name: CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791\n CVE-2015-1792, CVE-2015-4000\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2015-1791]\n\nThe OpenSSL advisory also describes a problem that is identified as\nCVE-2014-8176, which is already fixed by an earlier FreeBSD Errata\nNotice, FreeBSD-EN-15:02.openssl. \n\nIII. [CVE-2015-4000]. \n[CVE-2015-1788]. This affects FreeBSD 10.1 only, as the problem\nwas no longer exist in OpenSSL 0.9.8 series since July 2012. [CVE-2015-1790]. [CVE-2015-1792]\n\nAn attacker may be able to crash multi-thread applications that\nsupports resumed TLS handshakes. [CVE-2015-1791]\n\nIV. Workaround\n\nNo workaround is available. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.1]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-10.1.patch.asc\n# gpg --verify openssl-10.1.patch.asc\n\n[FreeBSD 9.3 and 8.4]\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:10/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in \u003cURL:https://www.FreeBSD.org/handbook/makeworld.html\u003e. \n\nRestart all deamons using the library, or reboot the system. \n\nVI. Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/8/ r284286\nreleng/8.4/ r284295\nstable/9/ r284286\nreleng/9.3/ r284295\nstable/10/ r284285\nreleng/10.1/ r284295\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:https://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: openssl security update\nAdvisory ID: RHSA-2015:1115-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-1115.html\nIssue date: 2015-06-15\nCVE Names: CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 \n CVE-2015-1791 CVE-2015-1792 CVE-2015-3216 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nAn invalid free flaw was found in the way OpenSSL handled certain DTLS\nhandshake messages. A malicious DTLS client or server could cause a DTLS\nserver or client using OpenSSL to crash or, potentially, execute arbitrary\ncode. (CVE-2014-8176)\n\nA flaw was found in the way the OpenSSL packages shipped with Red Hat\nEnterprise Linux 6 and 7 performed locking in the ssleay_rand_bytes()\nfunction. (CVE-2015-3216)\n\nAn out-of-bounds read flaw was found in the X509_cmp_time() function of\nOpenSSL. A specially crafted X.509 certificate or a Certificate Revocation\nList (CRL) could possibly cause a TLS/SSL server or client using OpenSSL\nto crash. (CVE-2015-1789)\n\nA race condition was found in the session handling code of OpenSSL. This\nissue could possibly cause a multi-threaded TLS/SSL client using OpenSSL\nto double free session ticket data and crash. (CVE-2015-1791)\n\nA flaw was found in the way OpenSSL handled Cryptographic Message Syntax\n(CMS) messages. A CMS message with an unknown hash function identifier\ncould cause an application using OpenSSL to enter an infinite loop. \n(CVE-2015-1792)\n\nA NULL pointer dereference was found in the way OpenSSL handled certain\nPKCS#7 inputs. A specially crafted PKCS#7 input with missing\nEncryptedContent data could cause an application using OpenSSL to crash. \n(CVE-2015-1790)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-8176, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791 and\nCVE-2015-1792 flaws. Upstream acknowledges Praveen Kariyanahalli and Ivan\nFratric as the original reporters of CVE-2014-8176, Robert Swiecki and\nHanno B\u00f6ck as the original reporters of CVE-2015-1789, Michal Zalewski as\nthe original reporter of CVE-2015-1790, Emilia K\u00e4sper as the original\nreport of CVE-2015-1791 and Johannes Bauer as the original reporter of\nCVE-2015-1792. \n\nAll openssl users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression\n1228603 - CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time\n1228604 - CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent\n1228607 - CVE-2015-1792 OpenSSL: CMS verify infinite loop with unknown hash function\n1228608 - CVE-2015-1791 OpenSSL: Race condition handling NewSessionTicket\n1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\n\nppc64:\nopenssl-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.ppc.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.s390.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.ppc64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.s390x.rpm\nopenssl-static-1.0.1e-30.el6_6.11.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.11.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.11.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.11.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.11.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nppc64:\nopenssl-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-42.ael7b_1.8.src.rpm\n\nppc64le:\nopenssl-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-devel-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-libs-1.0.1e-42.ael7b_1.8.ppc64le.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.ppc64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.ppc.rpm\nopenssl-static-1.0.1e-42.el7_1.8.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.s390x.rpm\nopenssl-static-1.0.1e-42.el7_1.8.s390.rpm\nopenssl-static-1.0.1e-42.el7_1.8.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64le:\nopenssl-debuginfo-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-perl-1.0.1e-42.ael7b_1.8.ppc64le.rpm\nopenssl-static-1.0.1e-42.ael7b_1.8.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-42.el7_1.8.src.rpm\n\nx86_64:\nopenssl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-debuginfo-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm\nopenssl-static-1.0.1e-42.el7_1.8.i686.rpm\nopenssl-static-1.0.1e-42.el7_1.8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2014-8176\nhttps://access.redhat.com/security/cve/CVE-2015-1789\nhttps://access.redhat.com/security/cve/CVE-2015-1790\nhttps://access.redhat.com/security/cve/CVE-2015-1791\nhttps://access.redhat.com/security/cve/CVE-2015-1792\nhttps://access.redhat.com/security/cve/CVE-2015-3216\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://www.openssl.org/news/secadv_20150611.txt\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVf0NNXlSAg2UNWIIRArL4AJ9e7lbD/4Nks5midR5o3E4Bs5lQWQCgnrvk\nZyXizCcFL9oAQexObjxp/Mo=\n=PXiY\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce. 5 client) - i386, x86_64\n\n3. \n(CVE-2015-1790)\n\nA flaw was found in the way the TLS protocol composes the Diffie-Hellman \n(DH) key exchange. (CVE-2015-4000)\n\nNote: This update forces the TLS/SSL client implementation in OpenSSL to \nreject DH key sizes below 768 bits, which prevents sessions to be \ndowngraded to export-grade keys. OpenSSL Security Advisory [11 Jun 2015]\n=======================================\n\nDHE man-in-the-middle protection (Logjam)\n====================================================================\n\nA vulnerability in the TLS protocol allows a man-in-the-middle\nattacker to downgrade vulnerable TLS connections using ephemeral\nDiffie-Hellman key exchange to 512-bit export-grade cryptography. This\nvulnerability is known as Logjam (CVE-2015-4000). \n\nOpenSSL has added protection for TLS clients by rejecting handshakes\nwith DH parameters shorter than 768 bits. This limit will be increased\nto 1024 bits in a future release. \n\nMalformed ECParameters causes infinite loop (CVE-2015-1788)\n===========================================================\n\nSeverity: Moderate\n\nWhen processing an ECParameters structure OpenSSL enters an infinite loop if\nthe curve specified is over a specially malformed binary polynomial field. \n\nThis can be used to perform denial of service against any\nsystem which processes public keys, certificate requests or\ncertificates. This includes TLS clients and TLS servers with\nclient authentication enabled. \n\nThis issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent\n1.0.0 and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are\naffected. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0d (and below) users should upgrade to 1.0.0s\nOpenSSL 0.9.8r (and below) users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 6th April 2015 by Joseph Birr-Pixton. The\nfix was developed by Andy Polyakov of the OpenSSL development team. \n\nExploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)\n===============================================================\n\nSeverity: Moderate\n\nX509_cmp_time does not properly check the length of the ASN1_TIME\nstring and can read a few bytes out of bounds. In addition,\nX509_cmp_time accepts an arbitrary number of fractional seconds in the\ntime string. \n\nAn attacker can use this to craft malformed certificates and CRLs of\nvarious sizes and potentially cause a segmentation fault, resulting in\na DoS on applications that verify certificates or CRLs. TLS clients\nthat verify CRLs are affected. TLS clients and servers with client\nauthentication enabled may be affected if they use custom verification\ncallbacks. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 8th April 2015 by Robert Swiecki\n(Google), and independently on 11th April 2015 by Hanno B\u00f6ck. The fix\nwas developed by Emilia K\u00e4sper of the OpenSSL development team. \n\nPKCS7 crash with missing EnvelopedContent (CVE-2015-1790)\n=========================================================\n\nSeverity: Moderate\n\nThe PKCS#7 parsing code does not handle missing inner EncryptedContent\ncorrectly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs\nwith missing content and trigger a NULL pointer dereference on parsing. \n\nApplications that decrypt PKCS#7 data or otherwise parse PKCS#7\nstructures from untrusted sources are affected. OpenSSL clients and\nservers are not affected. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 18th April 2015 by Michal\nZalewski (Google). The fix was developed by Emilia K\u00e4sper of the\nOpenSSL development team. \n\nThis can be used to perform denial of service against any system which\nverifies signedData messages using the CMS code. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2b\nOpenSSL 1.0.1 users should upgrade to 1.0.1n\nOpenSSL 1.0.0 users should upgrade to 1.0.0s\nOpenSSL 0.9.8 users should upgrade to 0.9.8zg\n\nThis issue was reported to OpenSSL on 31st March 2015 by Johannes Bauer. The\nfix was developed by Dr. Stephen Henson of the OpenSSL development team. \n\nThis issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. The\nfix was developed by Matt Caswell of the OpenSSL development team. It\nexisted in previous OpenSSL versions and was fixed in June 2014. \n\nIf a DTLS peer receives application data between the ChangeCipherSpec\nand Finished messages, buffering of such data may cause an invalid\nfree, resulting in a segmentation fault or potentially, memory\ncorruption. \n\nThis issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8. \n\nOpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za\nOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. \nOpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. \n\nThis issue was originally reported on March 28th 2014 in\nhttps://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen\nKariyanahalli, and subsequently by Ivan Fratric and Felix Groebert\n(Google). A fix was developed by zhu qun-ying. \n\nThe fix for this issue can be identified by commits bcc31166 (1.0.1),\nb79e6e3a (1.0.0) and 4b258e73 (0.9.8). \n\nNote\n====\n\nAs per our previous announcements and our Release Strategy\n(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions\n1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these\nreleases will be provided after that date. Users of these releases are advised\nto upgrade. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20150611.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n", "sources": [ { "db": "NVD", "id": "CVE-2015-1789" }, { "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "db": "BID", "id": "75156" }, { "db": "VULMON", "id": "CVE-2015-1789" }, { "db": "PACKETSTORM", "id": "137294" }, { "db": "PACKETSTORM", "id": "132973" }, { "db": "PACKETSTORM", "id": "132260" }, { "db": "PACKETSTORM", "id": "132288" }, { "db": "PACKETSTORM", "id": "132313" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "132508" }, { "db": "PACKETSTORM", "id": "169629" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-1789", "trust": 3.6 }, { "db": "JUNIPER", "id": "JSA10733", "trust": 2.0 }, { "db": "JUNIPER", "id": "JSA10694", "trust": 2.0 }, { "db": "BID", "id": "75156", "trust": 2.0 }, { "db": "BID", "id": "91787", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-412672", "trust": 1.7 }, { "db": "MCAFEE", "id": "SB10122", "trust": 1.7 }, { "db": "SECTRACK", "id": "1032564", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU91445763", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-003081", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2022.0696", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201506-245", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-22-349-21", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-1789", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137294", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132973", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132260", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132288", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132313", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137292", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132508", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169629", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-1789" }, { "db": "BID", "id": "75156" }, { "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "db": "PACKETSTORM", "id": "137294" }, { "db": "PACKETSTORM", "id": "132973" }, { "db": "PACKETSTORM", "id": "132260" }, { "db": "PACKETSTORM", "id": "132288" }, { "db": "PACKETSTORM", "id": "132313" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "132508" }, { "db": "PACKETSTORM", "id": "169629" }, { "db": "CNNVD", "id": "CNNVD-201506-245" }, { "db": "NVD", "id": "CVE-2015-1789" } ] }, "id": "VAR-201506-0498", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.2242063475 }, "last_update_date": "2024-07-04T22:03:03.877000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html" }, { "title": "HT205031", "trust": 0.8, "url": "https://support.apple.com/en-us/ht205031" }, { "title": "HT205031", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht205031" }, { "title": "cisco-sa-20150612-openssl", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-openssl" }, { "title": "Fix length checks in X509_cmp_time to avoid out-of-bounds reads.", "trust": 0.8, "url": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11" }, { "title": "HPSBUX03388", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026amp;m=143880121627664\u0026amp;w=2" }, { "title": "HPSBMU03612", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380" }, { "title": "HPSBHF03613", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351" }, { "title": "HPSBMU03546", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05045763" }, { "title": "HPSBMU03611", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888" }, { "title": "\u30a2\u30e9\u30a4\u30c9\u30c6\u30ec\u30b7\u30b9\u682a\u5f0f\u4f1a\u793e\u304b\u3089\u306e\u60c5\u5831", "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu91445763/522154/index.html" }, { "title": "NV15-010", "trust": 0.8, "url": "http://jpn.nec.com/security-info/secinfo/nv15-010.html" }, { "title": "OpenSSL vulnerabilities", "trust": 0.8, "url": "https://www.openssl.org/news/vulnerabilities.html" }, { "title": "Tarballs", "trust": 0.8, "url": "https://www.openssl.org/source/" }, { "title": "[11 Jun 2015] DHE man-in-the-middle protection (Logjam)", "trust": 0.8, "url": "https://www.openssl.org/news/secadv_20150611.txt" }, { "title": "Oracle Critical Patch Update Advisory - October 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "title": "Text Form of Oracle Critical Patch Update - April 2016 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html" }, { "title": "Text Form of Oracle Critical Patch Update - October 2015 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015verbose-2367954.html" }, { "title": "Oracle Critical Patch Update Advisory - July 2016", "trust": 0.8, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "title": "Oracle Critical Patch Update Advisory - January 2016", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "title": "Text Form of Oracle Critical Patch Update - July 2016 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2016verbose-2881721.html" }, { "title": "Text Form of Oracle Critical Patch Update - January 2016 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016verbose-2367956.html" }, { "title": "Oracle Critical Patch Update Advisory - April 2016", "trust": 0.8, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "title": "Oracle Critical Patch Update CVSS V2 Risk Matrices - April 2016", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html" }, { "title": "Oracle Solaris Third Party Bulletin - July 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "title": "April 2016 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/april_2016_critical_patch_update" }, { "title": "October 2015 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/october_2015_critical_patch_update" }, { "title": "July 2016 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/july_2016_critical_patch_update" }, { "title": "January 2016 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/january_2016_critical_patch_update" }, { "title": "JSA10694", "trust": 0.8, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10694" }, { "title": "TLSA-2015-14", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2015/tlsa-2015-14j.html" }, { "title": "cisco-sa-20150612-openssl", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/112/1129/1129443_cisco-sa-20150612-openssl-j.html" }, { "title": "openssl-1.0.1n", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=56612" }, { "title": "openssl-1.0.0s", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=56611" }, { "title": "openssl-0.9.8zg", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=56610" }, { "title": "openssl-1.0.2b", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=56613" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2016/07/06/hpe_rushes_out_patch_for_more_than_a_year_of_openssl_vulns/" }, { "title": "Red Hat: CVE-2015-1789", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2015-1789" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2639-1" }, { "title": "Amazon Linux AMI: ALAS-2015-550", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2015-550" }, { "title": "Tenable Security Advisories: [R7] OpenSSL \u002720150611\u0027 Advisory Affects Tenable Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=tns-2015-07" }, { "title": "Cisco: Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20150612-openssl" }, { "title": "Symantec Security Advisories: SA98 : OpenSSL Security Advisory 11-June-2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=a7350b0751124b5a44ba8dbd2df71f9f" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=8b701aba68029ec36b631a8e26157a22" }, { "title": "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=eb059834b7f24e2562bcf592b6d0afbc" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=744c19dc9f4f70ad58059bf8733ec9c1" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=05aabe19d38058b7814ef5514aab4c0c" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=69e9536e77203a3c76b24dd89f4f9300" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - April 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=143b3fb255063c81571469eaa3cf0a87" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=523d3f220a64ff01dd95e064bd37566a" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=2f446a7e1ea263c0c3a365776c6713f2" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=122319027ae43d6d626710f1b1bb1d43" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=3a04485ebb79f7fbc2472bf9af5ce489" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=63802a6c83b107c4e6e0c7f9241a66a8" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2015-1789 " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/khadas/android_external_honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/yaap/external_honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/crdroid-r/external_honggfuzz " }, { "title": "tab_pie_external_honggfuzz", "trust": 0.1, "url": "https://github.com/credenceid/tab_pie_external_honggfuzz " }, { "title": "platform_external_honggfuzz", "trust": 0.1, "url": "https://github.com/dennissimos/platform_external_honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/swordphoenix/external_honggfuzz " }, { "title": "platform_external_honggfuzz", "trust": 0.1, "url": "https://github.com/aosp-caf-upstream/platform_external_honggfuzz " }, { "title": "honggfuzz_READ", "trust": 0.1, "url": "https://github.com/imbaya2466/honggfuzz_read " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/bananadroid/android_external_honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/forklineageos/external_honggfuzz " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/thexperienceproject/android_external_honggfuzz " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/random-aosp-stuff/android_external_honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/wave-project/external_honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/project-1ce/external_honggfuzz " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/jingpad-bsp/android_external_honggfuzz " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/crdroidandroid/android_external_honggfuzz " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/statixos/android_external_honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/caf-extended/external_honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/ozone-os/external_honggfuzz " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/corvus-r/android_external_honggfuzz " }, { "title": "external-honggfuzz", "trust": 0.1, "url": "https://github.com/tinkerboard2-android/external-honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/tinkeredger-android/external_honggfuzz " }, { "title": "", "trust": 0.1, "url": "https://github.com/ep-infosec/50_google_honggfuzz " }, { "title": "lllnx", "trust": 0.1, "url": "https://github.com/lllnx/lllnx " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/tinkerboard2-android/external_honggfuzz " }, { "title": "external-honggfuzz", "trust": 0.1, "url": "https://github.com/tinkerboard-android/external-honggfuzz " }, { "title": "external_honggfuzz", "trust": 0.1, "url": "https://github.com/havocr/external_honggfuzz " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/protonaosp-platina/android_external_honggfuzz " }, { "title": "android_external_honggfuzz", "trust": 0.1, "url": "https://github.com/protonaosp/android_external_honggfuzz " }, { "title": "", "trust": 0.1, "url": "https://github.com/tomoms/android_external_honggfuzz " }, { "title": "honggfuzz", "trust": 0.1, "url": "https://github.com/google/honggfuzz " } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-1789" }, { "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "db": "CNNVD", "id": "CNNVD-201506-245" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "db": "NVD", "id": "CVE-2015-1789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.openssl.org/news/secadv_20150611.txt" }, { "trust": 2.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1115.html" }, { "trust": 2.0, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10694" }, { "trust": 2.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "trust": 2.0, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 2.0, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-openssl" }, { "trust": 2.0, "url": "https://support.citrix.com/article/ctx216642" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/75156" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-2639-1" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2015-1197.html" }, { "trust": 1.7, "url": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html" }, { "trust": 1.7, "url": "https://support.apple.com/kb/ht205031" }, { "trust": 1.7, "url": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05157667" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05131044" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/91787" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05184351" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763" }, { "trust": 1.7, "url": "http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "trust": 1.7, "url": "https://openssl.org/news/secadv/20150611.txt" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "trust": 1.7, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10733" }, { "trust": 1.7, "url": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "trust": 1.7, "url": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "trust": 1.7, "url": "https://bto.bluecoat.com/security-advisory/sa98" }, { "trust": 1.7, "url": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05353965" }, { "trust": 1.7, "url": "https://security.gentoo.org/glsa/201506-02" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" }, { "trust": 1.7, "url": "http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc" }, { "trust": 1.7, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10122" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160647.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160436.html" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1032564" }, { "trust": 1.7, "url": "http://www.debian.org/security/2015/dsa-3287" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "trust": 1.7, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu91445763/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1789" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1789" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2015-1789" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1791" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1790" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1792" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2015:1115" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228603" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2015:1197" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0696" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1788" }, { "trust": 0.4, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4000" }, { "trust": 0.3, "url": "http://openssl.org/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022444" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962775" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965845" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/aug/13" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10733\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04739301" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05353965" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/aug/135" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05157667" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022527" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=isg3t1022724" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005313" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005376" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21961837" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962520" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963232" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963954" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21965415" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21966484" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966723" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022655" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098801" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101012435" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101013879" }, { "trust": 0.3, "url": "http://www.fortiguard.com/advisory/fg-ir-15-014/" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101012550" }, { "trust": 0.3, "url": "https://www.alienvault.com/forums/discussion/5438/security-advisory-alienvault-v5-0-4-addresses-31-vulnerabilities" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962519" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962726" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963964" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005375" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962039" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020862" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022647" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962686" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961800" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961633" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960633" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963096" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960713" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964033" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964441" }, { "trust": 0.3, "url": "www-01.ibm.com/support/docview.wss?uid=swg21903425" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960157" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961179" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962493" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?rs=0\u0026uid=swg21963438" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962623" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959518" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961438" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961569" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963270" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005314" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005373" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005434" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960045" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963498" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966481" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966847" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966873" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967384" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21968046" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21968724" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21968871" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970020" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21970103" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21971238" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21964030" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963603" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966381" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8176" }, { "trust": 0.2, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n" }, { "trust": 0.2, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3194" }, { "trust": 0.2, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0799" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-1790" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2015-1789" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2639-1/" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=44733" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/swd/public" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0705" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5161" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5600" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0800" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2842" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3566" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1793" }, { "trust": 0.1, "url": "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu9.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.15" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu11.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.31" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1789\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch.asc" }, { "trust": 0.1, "url": "https://www.openssl.org/news/secadv_20150611.txt\u003e" }, { "trust": 0.1, "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4000\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1790\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch" }, { "trust": 0.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-15:10.openssl.asc\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/\u003e." }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1791\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:10/openssl-10.1.patch.asc" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:10/openssl-8.4.patch" }, { "trust": 0.1, "url": "https://www.freebsd.org/handbook/makeworld.html\u003e." }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1788\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1792\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3216" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-1791" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-1792" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-8176" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-3216" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7995" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-6750" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8035" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0705" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3567" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3237" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3513" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0728" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7501" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7547" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4969" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6565" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0205" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3568" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3508" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3569" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3509" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3511" }, { "trust": 0.1, "url": "http://www.hpe.com/info/insightcontrol" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-4000" }, { "trust": 0.1, "url": "https://www.openssl.org/about/secpolicy.html" }, { "trust": 0.1, "url": "https://www.openssl.org/about/releasestrat.html)," }, { "trust": 0.1, "url": "https://rt.openssl.org/ticket/display.html?id=3286" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-1789" }, { "db": "BID", "id": "75156" }, { "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "db": "PACKETSTORM", "id": "137294" }, { "db": "PACKETSTORM", "id": "132973" }, { "db": "PACKETSTORM", "id": "132260" }, { "db": "PACKETSTORM", "id": "132288" }, { "db": "PACKETSTORM", "id": "132313" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "132508" }, { "db": "PACKETSTORM", "id": "169629" }, { "db": "CNNVD", "id": "CNNVD-201506-245" }, { "db": "NVD", "id": "CVE-2015-1789" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2015-1789" }, { "db": "BID", "id": "75156" }, { "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "db": "PACKETSTORM", "id": "137294" }, { "db": "PACKETSTORM", "id": "132973" }, { "db": "PACKETSTORM", "id": "132260" }, { "db": "PACKETSTORM", "id": "132288" }, { "db": "PACKETSTORM", "id": "132313" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "132508" }, { "db": "PACKETSTORM", "id": "169629" }, { "db": "CNNVD", "id": "CNNVD-201506-245" }, { "db": "NVD", "id": "CVE-2015-1789" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-12T00:00:00", "db": "VULMON", "id": "CVE-2015-1789" }, { "date": "2015-06-11T00:00:00", "db": "BID", "id": "75156" }, { "date": "2015-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "date": "2016-06-02T16:22:00", "db": "PACKETSTORM", "id": "137294" }, { "date": "2015-08-06T10:10:00", "db": "PACKETSTORM", "id": "132973" }, { "date": "2015-06-11T23:39:03", "db": "PACKETSTORM", "id": "132260" }, { "date": "2015-06-12T13:25:28", "db": "PACKETSTORM", "id": "132288" }, { "date": "2015-06-15T23:37:59", "db": "PACKETSTORM", "id": "132313" }, { "date": "2016-06-02T19:12:12", "db": "PACKETSTORM", "id": "137292" }, { "date": "2015-07-01T02:01:05", "db": "PACKETSTORM", "id": "132508" }, { "date": "2015-06-11T12:12:12", "db": "PACKETSTORM", "id": "169629" }, { "date": "2015-06-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-245" }, { "date": "2015-06-12T19:59:02.507000", "db": "NVD", "id": "CVE-2015-1789" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-13T00:00:00", "db": "VULMON", "id": "CVE-2015-1789" }, { "date": "2017-05-02T01:08:00", "db": "BID", "id": "75156" }, { "date": "2017-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003081" }, { "date": "2023-04-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-245" }, { "date": "2023-02-13T00:46:47.770000", "db": "NVD", "id": "CVE-2015-1789" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "132260" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "CNNVD", "id": "CNNVD-201506-245" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL of crypto/x509/x509_vfy.c of X509_cmp_time Service disruption in functions (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003081" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-245" } ], "trust": 0.6 } }
ghsa-q289-c6qx-8gxc
Vulnerability from github
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
{ "affected": [], "aliases": [ "CVE-2015-1789" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-06-12T19:59:00Z", "severity": "HIGH" }, "details": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", "id": "GHSA-q289-c6qx-8gxc", "modified": "2022-05-13T01:05:13Z", "published": "2022-05-13T01:05:13Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789" }, { "type": "WEB", "url": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv_20150611.txt" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX216642" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT205031" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201506-02" }, { "type": "WEB", "url": "https://openssl.org/news/secadv/20150611.txt" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228603" }, { "type": "WEB", "url": "https://bto.bluecoat.com/security-advisory/sa98" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2015-1789" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1197" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2015:1115" }, { "type": "WEB", "url": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "type": "WEB", "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1115.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1197.html" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3287" }, { "type": "WEB", "url": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015" }, { "type": "WEB", "url": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/75156" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91787" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1032564" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2639-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2015-1789
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-1789", "description": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", "id": "GSD-2015-1789", "references": [ "https://www.suse.com/security/cve/CVE-2015-1789.html", "https://www.debian.org/security/2015/dsa-3287", "https://access.redhat.com/errata/RHSA-2015:1197", "https://access.redhat.com/errata/RHSA-2015:1115", "https://ubuntu.com/security/CVE-2015-1789", "https://advisories.mageia.org/CVE-2015-1789.html", "https://alas.aws.amazon.com/cve/html/CVE-2015-1789.html", "https://linux.oracle.com/cve/CVE-2015-1789.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-1789" ], "details": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", "id": "GSD-2015-1789", "modified": "2023-12-13T01:20:05.248850Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "MISC", "url": "https://support.apple.com/kb/HT205031" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", "refsource": "MISC", "url": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "name": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", "refsource": "MISC", "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694", "refsource": "MISC", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733", "refsource": "MISC", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2" }, { "name": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2" }, { "name": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1115.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1115.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1197.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1197.html" }, { "name": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl", "refsource": "MISC", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl" }, { "name": "http://www.debian.org/security/2015/dsa-3287", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3287" }, { "name": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", "refsource": "MISC", "url": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015" }, { "name": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", "refsource": "MISC", "url": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "http://www.securityfocus.com/bid/75156", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/75156" }, { "name": "http://www.securityfocus.com/bid/91787", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "http://www.securitytracker.com/id/1032564", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1032564" }, { "name": "http://www.ubuntu.com/usn/USN-2639-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2639-1" }, { "name": "https://bto.bluecoat.com/security-advisory/sa98", "refsource": "MISC", "url": "https://bto.bluecoat.com/security-advisory/sa98" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "name": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11", "refsource": "MISC", "url": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122", "refsource": "MISC", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122" }, { "name": "https://openssl.org/news/secadv/20150611.txt", "refsource": "MISC", "url": "https://openssl.org/news/secadv/20150611.txt" }, { "name": "https://security.gentoo.org/glsa/201506-02", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201506-02" }, { "name": "https://support.citrix.com/article/CTX216642", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX216642" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11" }, { "name": "https://www.openssl.org/news/secadv_20150611.txt", "refsource": "MISC", "url": "https://www.openssl.org/news/secadv_20150611.txt" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.8zf", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1121", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1789" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv_20150611.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv_20150611.txt" }, { "name": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/kb/HT205031" }, { "name": "SSRT102180", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694", "refsource": "CONFIRM", "tags": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "91787", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763" }, { "name": "HPSBGN03371", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2" }, { "name": "HPSBMU03409", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "75156", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/75156" }, { "name": "https://openssl.org/news/secadv/20150611.txt", "refsource": "CONFIRM", "tags": [], "url": "https://openssl.org/news/secadv/20150611.txt" }, { "name": "openSUSE-SU-2016:0640", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733", "refsource": "CONFIRM", "tags": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733" }, { "name": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015", "refsource": "CONFIRM", "tags": [], "url": "http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "name": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015", "refsource": "CONFIRM", "tags": [], "url": "http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015" }, { "name": "https://bto.bluecoat.com/security-advisory/sa98", "refsource": "CONFIRM", "tags": [], "url": "https://bto.bluecoat.com/security-advisory/sa98" }, { "name": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015", "refsource": "CONFIRM", "tags": [], "url": "http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965" }, { "name": "GLSA-201506-02", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201506-02" }, { "name": "openSUSE-SU-2015:1277", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" }, { "name": "NetBSD-SA2015-008", "refsource": "NETBSD", "tags": [], "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122", "refsource": "CONFIRM", "tags": [], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122" }, { "name": "RHSA-2015:1115", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1115.html" }, { "name": "SUSE-SU-2015:1185", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" }, { "name": "SUSE-SU-2015:1184", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" }, { "name": "SUSE-SU-2015:1183", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" }, { "name": "SUSE-SU-2015:1182", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" }, { "name": "SUSE-SU-2015:1181", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" }, { "name": "SUSE-SU-2015:1150", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" }, { "name": "SUSE-SU-2015:1143", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" }, { "name": "openSUSE-SU-2015:1139", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" }, { "name": "FEDORA-2015-10108", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html" }, { "name": "FEDORA-2015-10047", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html" }, { "name": "USN-2639-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2639-1" }, { "name": "1032564", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1032564" }, { "name": "DSA-3287", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2015/dsa-3287" }, { "name": "20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products", "refsource": "CISCO", "tags": [], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl" }, { "name": "RHSA-2015:1197", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1197.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "https://support.citrix.com/article/CTX216642", "refsource": "CONFIRM", "tags": [], "url": "https://support.citrix.com/article/CTX216642" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11", "refsource": "MISC", "tags": [], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-13T00:46Z", "publishedDate": "2015-06-12T19:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.