Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-3238 (GCVE-0-2015-3238)
Vulnerability from cvelistv5 – Published: 2015-08-24 14:00 – Updated: 2024-08-06 05:39- n/a
| URL | Tags |
|---|---|
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
| http://rhn.redhat.com/errata/RHSA-2015-1640.html | vendor-advisoryx_refsource_REDHAT |
| http://www.openwall.com/lists/oss-security/2015/0… | mailing-listx_refsource_MLIST |
| https://bugzilla.redhat.com/show_bug.cgi?id=1228571 | x_refsource_CONFIRM |
| https://www.trustwave.com/Resources/Security-Advi… | x_refsource_MISC |
| https://security.gentoo.org/glsa/201605-05 | vendor-advisoryx_refsource_GENTOO |
| http://www.ubuntu.com/usn/USN-2935-2 | vendor-advisoryx_refsource_UBUNTU |
| http://www.ubuntu.com/usn/USN-2935-3 | vendor-advisoryx_refsource_UBUNTU |
| http://www.oracle.com/technetwork/security-adviso… | x_refsource_CONFIRM |
| http://www.ubuntu.com/usn/USN-2935-1 | vendor-advisoryx_refsource_UBUNTU |
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
| http://www.securityfocus.com/bid/75428 | vdb-entryx_refsource_BID |
| https://www.trustwave.com/Resources/SpiderLabs-Bl… | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T05:39:32.046Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2015-10830",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html"
},
{
"name": "RHSA-2015:1640",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1640.html"
},
{
"name": "[oss-security] 20150625 Linux-PAM 1.2.1 released to address CVE-2015-3238",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/06/25/13"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551"
},
{
"name": "GLSA-201605-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201605-05"
},
{
"name": "USN-2935-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2935-2"
},
{
"name": "USN-2935-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2935-3"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "USN-2935-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2935-1"
},
{
"name": "FEDORA-2015-10848",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html"
},
{
"name": "75428",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/75428"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-06-25T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-01T15:57:02.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "FEDORA-2015-10830",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html"
},
{
"name": "RHSA-2015:1640",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1640.html"
},
{
"name": "[oss-security] 20150625 Linux-PAM 1.2.1 released to address CVE-2015-3238",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/06/25/13"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551"
},
{
"name": "GLSA-201605-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201605-05"
},
{
"name": "USN-2935-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2935-2"
},
{
"name": "USN-2935-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2935-3"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "USN-2935-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2935-1"
},
{
"name": "FEDORA-2015-10848",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html"
},
{
"name": "75428",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/75428"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2015-3238",
"datePublished": "2015-08-24T14:00:00.000Z",
"dateReserved": "2015-04-10T00:00:00.000Z",
"dateUpdated": "2024-08-06T05:39:32.046Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2015-3238",
"date": "2026-05-22",
"epss": "0.0303",
"percentile": "0.86815"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.1.8\", \"matchCriteriaId\": \"97736CA5-0370-4CA9-B5D4-E157B3E699F5\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1121\", \"matchCriteriaId\": \"6AF02A45-1811-44F2-B3C9-90C11F5DF6DF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en la funci\\u00f3n _unix_run_helper_binary en el m\\u00f3dulo pam_unix en Linux-PAM (tambi\\u00e9n conocido como pam) en versiones anteriores a 1.2.1, cuando no es posible acceder directamente a las contrase\\u00f1as, permite a usuarios locales enumerar los nombres de usuario o causar una denegaci\\u00f3n de servicio (colgado) a trav\\u00e9s de una contrase\\u00f1a larga.\"}]",
"id": "CVE-2015-3238",
"lastModified": "2024-11-21T02:28:58.363",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 2.5}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:P\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2015-08-24T14:59:04.010",
"references": "[{\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-1640.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/06/25/13\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/75428\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2935-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2935-2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2935-3\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1228571\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://security.gentoo.org/glsa/201605-05\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-1640.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/06/25/13\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/75428\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2935-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2935-2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2935-3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1228571\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201605-05\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2015-3238\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-08-24T14:59:04.010\",\"lastModified\":\"2026-05-06T22:30:45.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en la funci\u00f3n _unix_run_helper_binary en el m\u00f3dulo pam_unix en Linux-PAM (tambi\u00e9n conocido como pam) en versiones anteriores a 1.2.1, cuando no es posible acceder directamente a las contrase\u00f1as, permite a usuarios locales enumerar los nombres de usuario o causar una denegaci\u00f3n de servicio (colgado) a trav\u00e9s de una contrase\u00f1a larga.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.8\",\"matchCriteriaId\":\"97736CA5-0370-4CA9-B5D4-E157B3E699F5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1121\",\"matchCriteriaId\":\"6AF02A45-1811-44F2-B3C9-90C11F5DF6DF\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1640.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/06/25/13\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/75428\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2935-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2935-2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2935-3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1228571\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/201605-05\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1640.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/06/25/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/75428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2935-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2935-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2935-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1228571\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201605-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
}
}
CERTFR-2016-AVI-136
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle Sun Systems Products Suite. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle Solaris Cluster version 6.9.0 | ||
| Oracle | N/A | Commutateurs Ethernet Oracle ES2-64 versions antérieures à 2.0.0.6 | ||
| Oracle | N/A | SPARC Enterprise serveurs M3000, M4000, M5000, M8000, M9000 exécutant XCP versions antérieures à XCP1121 | ||
| Oracle | N/A | Oracle Solaris version 11.3 | ||
| Oracle | N/A | Fujitsu serveurs M10-1, M10-4, M10-4S exécutant XCP versions antérieures à XCP2290 | ||
| Oracle | N/A | Oracle Solaris version 10 | ||
| Oracle | N/A | Commutateurs Ethernet Oracle ES2-72 versions antérieures à 2.0.0.6 | ||
| Oracle | N/A | Sun Storage Common Array Manager version 6.9.0 |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris Cluster version 6.9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Commutateurs Ethernet Oracle ES2-64 versions ant\u00e9rieures \u00e0 2.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "SPARC Enterprise serveurs M3000, M4000, M5000, M8000, M9000 ex\u00e9cutant XCP versions ant\u00e9rieures \u00e0 XCP1121",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris version 11.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Fujitsu serveurs M10-1, M10-4, M10-4S ex\u00e9cutant XCP versions ant\u00e9rieures \u00e0 XCP2290",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris version 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Commutateurs Ethernet Oracle ES2-72 versions ant\u00e9rieures \u00e0 2.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Sun Storage Common Array Manager version 6.9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0676"
},
{
"name": "CVE-2016-3465",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3465"
},
{
"name": "CVE-2015-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3238"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2015-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1793"
},
{
"name": "CVE-2015-7236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7236"
},
{
"name": "CVE-2016-0669",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0669"
},
{
"name": "CVE-2016-0693",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0693"
},
{
"name": "CVE-2016-3462",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3462"
},
{
"name": "CVE-2016-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3441"
},
{
"name": "CVE-2016-0623",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0623"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2011-4461",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4461"
},
{
"name": "CVE-2013-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4786"
},
{
"name": "CVE-2015-7547",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7547"
},
{
"name": "CVE-2016-3419",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3419"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2016v3verbose du 19 avril 2016",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016verbose-2881709.html#SUNS"
}
],
"reference": "CERTFR-2016-AVI-136",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Sun Systems Products Suite\u003c/span\u003e. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems Products Suite",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2016v3 du 19 avril 2016",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixSUNS"
}
]
}
CERTFR-2016-AVI-136
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle Sun Systems Products Suite. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle Solaris Cluster version 6.9.0 | ||
| Oracle | N/A | Commutateurs Ethernet Oracle ES2-64 versions antérieures à 2.0.0.6 | ||
| Oracle | N/A | SPARC Enterprise serveurs M3000, M4000, M5000, M8000, M9000 exécutant XCP versions antérieures à XCP1121 | ||
| Oracle | N/A | Oracle Solaris version 11.3 | ||
| Oracle | N/A | Fujitsu serveurs M10-1, M10-4, M10-4S exécutant XCP versions antérieures à XCP2290 | ||
| Oracle | N/A | Oracle Solaris version 10 | ||
| Oracle | N/A | Commutateurs Ethernet Oracle ES2-72 versions antérieures à 2.0.0.6 | ||
| Oracle | N/A | Sun Storage Common Array Manager version 6.9.0 |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris Cluster version 6.9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Commutateurs Ethernet Oracle ES2-64 versions ant\u00e9rieures \u00e0 2.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "SPARC Enterprise serveurs M3000, M4000, M5000, M8000, M9000 ex\u00e9cutant XCP versions ant\u00e9rieures \u00e0 XCP1121",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris version 11.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Fujitsu serveurs M10-1, M10-4, M10-4S ex\u00e9cutant XCP versions ant\u00e9rieures \u00e0 XCP2290",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris version 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Commutateurs Ethernet Oracle ES2-72 versions ant\u00e9rieures \u00e0 2.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Sun Storage Common Array Manager version 6.9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0676"
},
{
"name": "CVE-2016-3465",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3465"
},
{
"name": "CVE-2015-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3238"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2015-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1793"
},
{
"name": "CVE-2015-7236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7236"
},
{
"name": "CVE-2016-0669",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0669"
},
{
"name": "CVE-2016-0693",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0693"
},
{
"name": "CVE-2016-3462",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3462"
},
{
"name": "CVE-2016-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3441"
},
{
"name": "CVE-2016-0623",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0623"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2011-4461",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4461"
},
{
"name": "CVE-2013-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4786"
},
{
"name": "CVE-2015-7547",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7547"
},
{
"name": "CVE-2016-3419",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3419"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2016v3verbose du 19 avril 2016",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016verbose-2881709.html#SUNS"
}
],
"reference": "CERTFR-2016-AVI-136",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Sun Systems Products Suite\u003c/span\u003e. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems Products Suite",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2016v3 du 19 avril 2016",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixSUNS"
}
]
}
CNVD-2015-04464
Vulnerability from cnvd - Published: 2015-07-15目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页: http://www.linux-pam.org/
| Name | Linux-PAM Linux-PAM |
|---|
{
"bids": {
"bid": {
"bidNumber": "75428"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2015-3238"
}
},
"description": "Linux-PAM\uff08\u4e5f\u79f0PAM\uff09\u662f\u4e00\u79cd\u7528\u4e8eLinux\u5e73\u53f0\u4e2d\u7684\u8ba4\u8bc1\u673a\u5236\uff0c\u5b83\u901a\u8fc7\u63d0\u4f9b\u4e00\u4e9b\u52a8\u6001\u94fe\u63a5\u5e93\u548c\u4e00\u5957\u7edf\u4e00\u7684API\uff0c\u4f7f\u7cfb\u7edf\u7ba1\u7406\u5458\u53ef\u4ee5\u81ea\u7531\u9009\u62e9\u5e94\u7528\u7a0b\u5e8f\u4f7f\u7528\u7684\u9a8c\u8bc1\u673a\u5236\u3002\r\n\r\nLinux-PAM\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff0c\u83b7\u53d6\u6709\u6548\u7684\u7528\u6237\u8d26\u6237\uff0c\u6709\u52a9\u4e8e\u8fdb\u4e00\u6b65\u5b9e\u65bd\u66b4\u529b\u7834\u89e3\u653b\u51fb\u3002",
"discovererName": "Dmitry V. Levin",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttp://www.linux-pam.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-04464",
"openTime": "2015-07-15",
"patchDescription": "Linux-PAM\uff08\u4e5f\u79f0PAM\uff09\u662f\u4e00\u79cd\u7528\u4e8eLinux\u5e73\u53f0\u4e2d\u7684\u8ba4\u8bc1\u673a\u5236\uff0c\u5b83\u901a\u8fc7\u63d0\u4f9b\u4e00\u4e9b\u52a8\u6001\u94fe\u63a5\u5e93\u548c\u4e00\u5957\u7edf\u4e00\u7684API\uff0c\u4f7f\u7cfb\u7edf\u7ba1\u7406\u5458\u53ef\u4ee5\u81ea\u7531\u9009\u62e9\u5e94\u7528\u7a0b\u5e8f\u4f7f\u7528\u7684\u9a8c\u8bc1\u673a\u5236\u3002Linux-PAM\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff0c\u83b7\u53d6\u6709\u6548\u7684\u7528\u6237\u8d26\u6237\uff0c\u6709\u52a9\u4e8e\u8fdb\u4e00\u6b65\u5b9e\u65bd\u66b4\u529b\u7834\u89e3\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux-PAM \u0027_unix_run_helper_binary()\u0027\u51fd\u6570\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Linux-PAM Linux-PAM"
},
"referenceLink": "http://www.securityfocus.com/bid/75428",
"serverity": "\u4e2d",
"submitTime": "2015-07-10",
"title": "Linux-PAM \u0027_unix_run_helper_binary()\u0027\u51fd\u6570\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
FKIE_CVE-2015-3238
Vulnerability from fkie_nvd - Published: 2015-08-24 14:59 - Updated: 2026-05-06 22:30| Vendor | Product | Version | |
|---|---|---|---|
| linux-pam | linux-pam | * | |
| oracle | sparc-opl_service_processor | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97736CA5-0370-4CA9-B5D4-E157B3E699F5",
"versionEndIncluding": "1.1.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AF02A45-1811-44F2-B3C9-90C11F5DF6DF",
"versionEndIncluding": "1121",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password."
},
{
"lang": "es",
"value": "Vulnerabilidad en la funci\u00f3n _unix_run_helper_binary en el m\u00f3dulo pam_unix en Linux-PAM (tambi\u00e9n conocido como pam) en versiones anteriores a 1.2.1, cuando no es posible acceder directamente a las contrase\u00f1as, permite a usuarios locales enumerar los nombres de usuario o causar una denegaci\u00f3n de servicio (colgado) a trav\u00e9s de una contrase\u00f1a larga."
}
],
"id": "CVE-2015-3238",
"lastModified": "2026-05-06T22:30:45.220",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2015-08-24T14:59:04.010",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1640.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2015/06/25/13"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/75428"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-2935-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-2935-2"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-2935-3"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"source": "secalert@redhat.com",
"url": "https://security.gentoo.org/glsa/201605-05"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1640.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2015/06/25/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/75428"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2935-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2935-2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2935-3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201605-05"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-6R75-HHM5-F689
Vulnerability from github – Published: 2022-05-14 01:43 – Updated: 2025-04-12 12:51The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
{
"affected": [],
"aliases": [
"CVE-2015-3238"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-08-24T14:59:00Z",
"severity": "MODERATE"
},
"details": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"id": "GHSA-6r75-hhm5-f689",
"modified": "2025-04-12T12:51:16Z",
"published": "2022-05-14T01:43:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3238"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2015:1640"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2015-3238"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201605-05"
},
{
"type": "WEB",
"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551"
},
{
"type": "WEB",
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1640.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2015/06/25/13"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/75428"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2935-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2935-2"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2935-3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"type": "CVSS_V3"
}
]
}
GSD-2015-3238
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2015-3238",
"description": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"id": "GSD-2015-3238",
"references": [
"https://www.suse.com/security/cve/CVE-2015-3238.html",
"https://access.redhat.com/errata/RHSA-2015:1640",
"https://ubuntu.com/security/CVE-2015-3238",
"https://advisories.mageia.org/CVE-2015-3238.html",
"https://alas.aws.amazon.com/cve/html/CVE-2015-3238.html",
"https://linux.oracle.com/cve/CVE-2015-3238.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-3238"
],
"details": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"id": "GSD-2015-3238",
"modified": "2023-12-13T01:20:07.131998Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3238",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2015-1640.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1640.html"
},
{
"name": "http://www.openwall.com/lists/oss-security/2015/06/25/13",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2015/06/25/13"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "MISC",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "http://www.securityfocus.com/bid/75428",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/75428"
},
{
"name": "http://www.ubuntu.com/usn/USN-2935-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-2935-1"
},
{
"name": "http://www.ubuntu.com/usn/USN-2935-2",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-2935-2"
},
{
"name": "http://www.ubuntu.com/usn/USN-2935-3",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-2935-3"
},
{
"name": "https://security.gentoo.org/glsa/201605-05",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/201605-05"
},
{
"name": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551",
"refsource": "MISC",
"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551"
},
{
"name": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/",
"refsource": "MISC",
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1.8",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1121",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3238"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551"
},
{
"name": "RHSA-2015:1640",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1640.html"
},
{
"name": "[oss-security] 20150625 Linux-PAM 1.2.1 released to address CVE-2015-3238",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2015/06/25/13"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"name": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name": "GLSA-201605-05",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201605-05"
},
{
"name": "75428",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/75428"
},
{
"name": "FEDORA-2015-10830",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html"
},
{
"name": "USN-2935-3",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2935-3"
},
{
"name": "USN-2935-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2935-1"
},
{
"name": "USN-2935-2",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2935-2"
},
{
"name": "FEDORA-2015-10848",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
},
"lastModifiedDate": "2023-02-12T23:15Z",
"publishedDate": "2015-08-24T14:59Z"
}
}
}
OPENSUSE-SU-2024:10405-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "pam-1.3.0-3.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the pam-1.3.0-3.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10405",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10405-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3430 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3430/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3431 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3853 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3148 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3149 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2583 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3238 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3238/"
}
],
"title": "pam-1.3.0-3.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10405-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "pam-1.3.0-3.4.aarch64",
"product": {
"name": "pam-1.3.0-3.4.aarch64",
"product_id": "pam-1.3.0-3.4.aarch64"
}
},
{
"category": "product_version",
"name": "pam-32bit-1.3.0-3.4.aarch64",
"product": {
"name": "pam-32bit-1.3.0-3.4.aarch64",
"product_id": "pam-32bit-1.3.0-3.4.aarch64"
}
},
{
"category": "product_version",
"name": "pam-devel-1.3.0-3.4.aarch64",
"product": {
"name": "pam-devel-1.3.0-3.4.aarch64",
"product_id": "pam-devel-1.3.0-3.4.aarch64"
}
},
{
"category": "product_version",
"name": "pam-devel-32bit-1.3.0-3.4.aarch64",
"product": {
"name": "pam-devel-32bit-1.3.0-3.4.aarch64",
"product_id": "pam-devel-32bit-1.3.0-3.4.aarch64"
}
},
{
"category": "product_version",
"name": "pam-doc-1.3.0-3.4.aarch64",
"product": {
"name": "pam-doc-1.3.0-3.4.aarch64",
"product_id": "pam-doc-1.3.0-3.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-1.3.0-3.4.ppc64le",
"product": {
"name": "pam-1.3.0-3.4.ppc64le",
"product_id": "pam-1.3.0-3.4.ppc64le"
}
},
{
"category": "product_version",
"name": "pam-32bit-1.3.0-3.4.ppc64le",
"product": {
"name": "pam-32bit-1.3.0-3.4.ppc64le",
"product_id": "pam-32bit-1.3.0-3.4.ppc64le"
}
},
{
"category": "product_version",
"name": "pam-devel-1.3.0-3.4.ppc64le",
"product": {
"name": "pam-devel-1.3.0-3.4.ppc64le",
"product_id": "pam-devel-1.3.0-3.4.ppc64le"
}
},
{
"category": "product_version",
"name": "pam-devel-32bit-1.3.0-3.4.ppc64le",
"product": {
"name": "pam-devel-32bit-1.3.0-3.4.ppc64le",
"product_id": "pam-devel-32bit-1.3.0-3.4.ppc64le"
}
},
{
"category": "product_version",
"name": "pam-doc-1.3.0-3.4.ppc64le",
"product": {
"name": "pam-doc-1.3.0-3.4.ppc64le",
"product_id": "pam-doc-1.3.0-3.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-1.3.0-3.4.s390x",
"product": {
"name": "pam-1.3.0-3.4.s390x",
"product_id": "pam-1.3.0-3.4.s390x"
}
},
{
"category": "product_version",
"name": "pam-32bit-1.3.0-3.4.s390x",
"product": {
"name": "pam-32bit-1.3.0-3.4.s390x",
"product_id": "pam-32bit-1.3.0-3.4.s390x"
}
},
{
"category": "product_version",
"name": "pam-devel-1.3.0-3.4.s390x",
"product": {
"name": "pam-devel-1.3.0-3.4.s390x",
"product_id": "pam-devel-1.3.0-3.4.s390x"
}
},
{
"category": "product_version",
"name": "pam-devel-32bit-1.3.0-3.4.s390x",
"product": {
"name": "pam-devel-32bit-1.3.0-3.4.s390x",
"product_id": "pam-devel-32bit-1.3.0-3.4.s390x"
}
},
{
"category": "product_version",
"name": "pam-doc-1.3.0-3.4.s390x",
"product": {
"name": "pam-doc-1.3.0-3.4.s390x",
"product_id": "pam-doc-1.3.0-3.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-1.3.0-3.4.x86_64",
"product": {
"name": "pam-1.3.0-3.4.x86_64",
"product_id": "pam-1.3.0-3.4.x86_64"
}
},
{
"category": "product_version",
"name": "pam-32bit-1.3.0-3.4.x86_64",
"product": {
"name": "pam-32bit-1.3.0-3.4.x86_64",
"product_id": "pam-32bit-1.3.0-3.4.x86_64"
}
},
{
"category": "product_version",
"name": "pam-devel-1.3.0-3.4.x86_64",
"product": {
"name": "pam-devel-1.3.0-3.4.x86_64",
"product_id": "pam-devel-1.3.0-3.4.x86_64"
}
},
{
"category": "product_version",
"name": "pam-devel-32bit-1.3.0-3.4.x86_64",
"product": {
"name": "pam-devel-32bit-1.3.0-3.4.x86_64",
"product_id": "pam-devel-32bit-1.3.0-3.4.x86_64"
}
},
{
"category": "product_version",
"name": "pam-doc-1.3.0-3.4.x86_64",
"product": {
"name": "pam-doc-1.3.0-3.4.x86_64",
"product_id": "pam-doc-1.3.0-3.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.3.0-3.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64"
},
"product_reference": "pam-1.3.0-3.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.3.0-3.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le"
},
"product_reference": "pam-1.3.0-3.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.3.0-3.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-1.3.0-3.4.s390x"
},
"product_reference": "pam-1.3.0-3.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.3.0-3.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64"
},
"product_reference": "pam-1.3.0-3.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.3.0-3.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64"
},
"product_reference": "pam-32bit-1.3.0-3.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.3.0-3.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le"
},
"product_reference": "pam-32bit-1.3.0-3.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.3.0-3.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x"
},
"product_reference": "pam-32bit-1.3.0-3.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.3.0-3.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64"
},
"product_reference": "pam-32bit-1.3.0-3.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.3.0-3.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64"
},
"product_reference": "pam-devel-1.3.0-3.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.3.0-3.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le"
},
"product_reference": "pam-devel-1.3.0-3.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.3.0-3.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x"
},
"product_reference": "pam-devel-1.3.0-3.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.3.0-3.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64"
},
"product_reference": "pam-devel-1.3.0-3.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-32bit-1.3.0-3.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64"
},
"product_reference": "pam-devel-32bit-1.3.0-3.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-32bit-1.3.0-3.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le"
},
"product_reference": "pam-devel-32bit-1.3.0-3.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-32bit-1.3.0-3.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x"
},
"product_reference": "pam-devel-32bit-1.3.0-3.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-32bit-1.3.0-3.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64"
},
"product_reference": "pam-devel-32bit-1.3.0-3.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.3.0-3.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64"
},
"product_reference": "pam-doc-1.3.0-3.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.3.0-3.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le"
},
"product_reference": "pam-doc-1.3.0-3.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.3.0-3.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x"
},
"product_reference": "pam-doc-1.3.0-3.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.3.0-3.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
},
"product_reference": "pam-doc-1.3.0-3.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-3430",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3430"
}
],
"notes": [
{
"category": "general",
"text": "The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user\u0027s home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3430",
"url": "https://www.suse.com/security/cve/CVE-2010-3430"
},
{
"category": "external",
"summary": "SUSE Bug 623457 for CVE-2010-3430",
"url": "https://bugzilla.suse.com/623457"
},
{
"category": "external",
"summary": "SUSE Bug 631802 for CVE-2010-3430",
"url": "https://bugzilla.suse.com/631802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3430"
},
{
"cve": "CVE-2010-3431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3431"
}
],
"notes": [
{
"category": "general",
"text": "The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user\u0027s home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3431",
"url": "https://www.suse.com/security/cve/CVE-2010-3431"
},
{
"category": "external",
"summary": "SUSE Bug 623457 for CVE-2010-3431",
"url": "https://bugzilla.suse.com/623457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2010-3431"
},
{
"cve": "CVE-2010-3853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3853"
}
],
"notes": [
{
"category": "general",
"text": "pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3853",
"url": "https://www.suse.com/security/cve/CVE-2010-3853"
},
{
"category": "external",
"summary": "SUSE Bug 647958 for CVE-2010-3853",
"url": "https://bugzilla.suse.com/647958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3853"
},
{
"cve": "CVE-2011-3148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3148"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3148",
"url": "https://www.suse.com/security/cve/CVE-2011-3148"
},
{
"category": "external",
"summary": "SUSE Bug 724480 for CVE-2011-3148",
"url": "https://bugzilla.suse.com/724480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-3148"
},
{
"cve": "CVE-2011-3149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3149"
}
],
"notes": [
{
"category": "general",
"text": "The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3149",
"url": "https://www.suse.com/security/cve/CVE-2011-3149"
},
{
"category": "external",
"summary": "SUSE Bug 724480 for CVE-2011-3149",
"url": "https://bugzilla.suse.com/724480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3149"
},
{
"cve": "CVE-2014-2583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2583"
}
],
"notes": [
{
"category": "general",
"text": "Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2583",
"url": "https://www.suse.com/security/cve/CVE-2014-2583"
},
{
"category": "external",
"summary": "SUSE Bug 870433 for CVE-2014-2583",
"url": "https://bugzilla.suse.com/870433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2583"
},
{
"cve": "CVE-2015-3238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3238"
}
],
"notes": [
{
"category": "general",
"text": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3238",
"url": "https://www.suse.com/security/cve/CVE-2015-3238"
},
{
"category": "external",
"summary": "SUSE Bug 1123794 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/1123794"
},
{
"category": "external",
"summary": "SUSE Bug 934920 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/934920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:pam-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-devel-32bit-1.3.0-3.4.x86_64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.aarch64",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.ppc64le",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.s390x",
"openSUSE Tumbleweed:pam-doc-1.3.0-3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-3238"
}
]
}
RHSA-2015:1640
Vulnerability from csaf_redhat - Published: 2015-08-18 18:45 - Updated: 2025-11-21 17:53It was discovered that the _unix_run_helper_binary() function of PAM's unix_pam module could write to a blocking pipe, possibly causing the function to become unresponsive. An attacker able to supply large passwords to the unix_pam module could use this flaw to enumerate valid user accounts, or cause a denial of service on the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated pam package that fixes one security issue is now available for\nRed Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Pluggable Authentication Modules (PAM) provide a system whereby\nadministrators can set up authentication policies without having to\nrecompile programs to handle authentication.\n\nIt was discovered that the _unix_run_helper_binary() function of PAM\u0027s\nunix_pam module could write to a blocking pipe, possibly causing the\nfunction to become unresponsive. An attacker able to supply large passwords\nto the unix_pam module could use this flaw to enumerate valid user\naccounts, or cause a denial of service on the system. (CVE-2015-3238)\n\nRed Hat would like to thank Sebastien Macke of Trustwave SpiderLabs for\nreporting this issue.\n\nAll pam users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2015:1640",
"url": "https://access.redhat.com/errata/RHSA-2015:1640"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1228571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1640.json"
}
],
"title": "Red Hat Security Advisory: pam security update",
"tracking": {
"current_release_date": "2025-11-21T17:53:17+00:00",
"generator": {
"date": "2025-11-21T17:53:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2015:1640",
"initial_release_date": "2015-08-18T18:45:27+00:00",
"revision_history": [
{
"date": "2015-08-18T18:45:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-08-18T18:45:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:53:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.i686",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.i686",
"product_id": "pam-0:1.1.8-12.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.i686",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.i686",
"product_id": "pam-0:1.1.1-20.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.x86_64",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64",
"product_id": "pam-0:1.1.8-12.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.x86_64",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64",
"product_id": "pam-0:1.1.1-20.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.src",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.src",
"product_id": "pam-0:1.1.8-12.el7_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.ael7b_1.1.src",
"product": {
"name": "pam-0:1.1.8-12.ael7b_1.1.src",
"product_id": "pam-0:1.1.8-12.ael7b_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.ael7b_1.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.src",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.src",
"product_id": "pam-0:1.1.1-20.el6_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.s390",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.s390",
"product_id": "pam-0:1.1.8-12.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.s390",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.s390",
"product_id": "pam-0:1.1.1-20.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.s390x",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x",
"product_id": "pam-0:1.1.8-12.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.s390x",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x",
"product_id": "pam-0:1.1.1-20.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.ppc64",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64",
"product_id": "pam-0:1.1.8-12.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.ppc64",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64",
"product_id": "pam-0:1.1.1-20.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.ppc",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc",
"product_id": "pam-0:1.1.8-12.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.ppc",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc",
"product_id": "pam-0:1.1.1-20.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_id": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.ael7b_1.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"product": {
"name": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_id": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.ael7b_1.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"product": {
"name": "pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_id": "pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.ael7b_1.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le"
},
"product_reference": "pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.ael7b_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.ael7b_1.1.src",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le"
},
"product_reference": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Sebastien Macke"
],
"organization": "Trustwave SpiderLabs"
}
],
"cve": "CVE-2015-3238",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2015-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1228571"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the _unix_run_helper_binary() function of PAM\u0027s unix_pam module could write to a blocking pipe, possibly causing the function to become unresponsive. An attacker able to supply large passwords to the unix_pam module could use this flaw to enumerate valid user accounts, or cause a denial of service on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pam: DoS/user enumeration due to blocking pipe in pam_unix module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src",
"7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3238"
},
{
"category": "external",
"summary": "RHBZ#1228571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3238"
}
],
"release_date": "2015-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-08-18T18:45:27+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src",
"7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2015:1640"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src",
"7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pam: DoS/user enumeration due to blocking pipe in pam_unix module"
}
]
}
RHSA-2015_1640
Vulnerability from csaf_redhat - Published: 2015-08-18 18:45 - Updated: 2024-11-22 09:25It was discovered that the _unix_run_helper_binary() function of PAM's unix_pam module could write to a blocking pipe, possibly causing the function to become unresponsive. An attacker able to supply large passwords to the unix_pam module could use this flaw to enumerate valid user accounts, or cause a denial of service on the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated pam package that fixes one security issue is now available for\nRed Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Pluggable Authentication Modules (PAM) provide a system whereby\nadministrators can set up authentication policies without having to\nrecompile programs to handle authentication.\n\nIt was discovered that the _unix_run_helper_binary() function of PAM\u0027s\nunix_pam module could write to a blocking pipe, possibly causing the\nfunction to become unresponsive. An attacker able to supply large passwords\nto the unix_pam module could use this flaw to enumerate valid user\naccounts, or cause a denial of service on the system. (CVE-2015-3238)\n\nRed Hat would like to thank Sebastien Macke of Trustwave SpiderLabs for\nreporting this issue.\n\nAll pam users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2015:1640",
"url": "https://access.redhat.com/errata/RHSA-2015:1640"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1228571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1640.json"
}
],
"title": "Red Hat Security Advisory: pam security update",
"tracking": {
"current_release_date": "2024-11-22T09:25:32+00:00",
"generator": {
"date": "2024-11-22T09:25:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2015:1640",
"initial_release_date": "2015-08-18T18:45:27+00:00",
"revision_history": [
{
"date": "2015-08-18T18:45:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-08-18T18:45:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T09:25:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.i686",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.i686",
"product_id": "pam-0:1.1.8-12.el7_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.i686",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.i686",
"product_id": "pam-0:1.1.1-20.el6_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.x86_64",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64",
"product_id": "pam-0:1.1.8-12.el7_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.x86_64",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64",
"product_id": "pam-0:1.1.1-20.el6_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.src",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.src",
"product_id": "pam-0:1.1.8-12.el7_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.ael7b_1.1.src",
"product": {
"name": "pam-0:1.1.8-12.ael7b_1.1.src",
"product_id": "pam-0:1.1.8-12.ael7b_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.ael7b_1.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.src",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.src",
"product_id": "pam-0:1.1.1-20.el6_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.s390",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.s390",
"product_id": "pam-0:1.1.8-12.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.s390",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.s390",
"product_id": "pam-0:1.1.1-20.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.s390x",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x",
"product_id": "pam-0:1.1.8-12.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.s390x",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x",
"product_id": "pam-0:1.1.1-20.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.ppc64",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64",
"product_id": "pam-0:1.1.8-12.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.ppc64",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64",
"product_id": "pam-0:1.1.1-20.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"product_id": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.el7_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"product": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"product_id": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.el7_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.el7_1.1.ppc",
"product": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc",
"product_id": "pam-0:1.1.8-12.el7_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.el7_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"product": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"product_id": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.1-20.el6_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"product": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"product_id": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.1-20.el6_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.1-20.el6_7.1.ppc",
"product": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc",
"product_id": "pam-0:1.1.1-20.el6_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.1-20.el6_7.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"product": {
"name": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_id": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-debuginfo@1.1.8-12.ael7b_1.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"product": {
"name": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_id": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam-devel@1.1.8-12.ael7b_1.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"product": {
"name": "pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_id": "pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pam@1.1.8-12.ael7b_1.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Server-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.src",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.i686",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.s390x",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.1-20.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"relates_to_product_reference": "6Workstation-6.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Client-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Server-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le"
},
"product_reference": "pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.ael7b_1.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.ael7b_1.1.src",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le"
},
"product_reference": "pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.src",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.i686",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.s390x",
"relates_to_product_reference": "7Workstation-7.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-0:1.1.8-12.el7_1.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
},
"product_reference": "pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"relates_to_product_reference": "7Workstation-7.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Sebastien Macke"
],
"organization": "Trustwave SpiderLabs"
}
],
"cve": "CVE-2015-3238",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2015-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1228571"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the _unix_run_helper_binary() function of PAM\u0027s unix_pam module could write to a blocking pipe, possibly causing the function to become unresponsive. An attacker able to supply large passwords to the unix_pam module could use this flaw to enumerate valid user accounts, or cause a denial of service on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pam: DoS/user enumeration due to blocking pipe in pam_unix module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src",
"7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3238"
},
{
"category": "external",
"summary": "RHBZ#1228571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228571"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3238"
}
],
"release_date": "2015-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-08-18T18:45:27+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src",
"7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2015:1640"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Client-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Client-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6ComputeNode-optional-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6ComputeNode-optional-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Server-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Server-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.src",
"6Workstation-6.7.z:pam-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-debuginfo-0:1.1.1-20.el6_7.1.x86_64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.i686",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.ppc64",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.s390x",
"6Workstation-6.7.z:pam-devel-0:1.1.1-20.el6_7.1.x86_64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Client-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Client-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7ComputeNode-optional-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7ComputeNode-optional-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Server-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Server-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-0:1.1.8-12.ael7b_1.1.src",
"7Server-LE-7.1.Z:pam-debuginfo-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Server-LE-7.1.Z:pam-devel-0:1.1.8-12.ael7b_1.1.ppc64le",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.src",
"7Workstation-7.1.Z:pam-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-debuginfo-0:1.1.8-12.el7_1.1.x86_64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.i686",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.ppc64",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.s390x",
"7Workstation-7.1.Z:pam-devel-0:1.1.8-12.el7_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pam: DoS/user enumeration due to blocking pipe in pam_unix module"
}
]
}
SUSE-SU-2016:1645-1
Vulnerability from csaf_suse - Published: 2016-06-21 10:32 - Updated: 2016-06-21 10:32| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-x86-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-x86-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 11 SP4:pam-x86-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-x86-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ia64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.ppc64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for pam",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for pam fixes two security issues.\n\nThese security issues were fixed:\n- CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920).\n- CVE-2013-7041: Compare password hashes case-sensitively (bsc#854480).\n\nThis non-security issue was fixed:\n- bsc#962220: Don\u0027t fail when /var/log/btmp is corrupted\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-pam-12624,slessp4-pam-12624",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1645-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:1645-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161645-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:1645-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html"
},
{
"category": "self",
"summary": "SUSE Bug 854480",
"url": "https://bugzilla.suse.com/854480"
},
{
"category": "self",
"summary": "SUSE Bug 934920",
"url": "https://bugzilla.suse.com/934920"
},
{
"category": "self",
"summary": "SUSE Bug 962220",
"url": "https://bugzilla.suse.com/962220"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-7041 page",
"url": "https://www.suse.com/security/cve/CVE-2013-7041/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3238 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3238/"
}
],
"title": "Security update for pam",
"tracking": {
"current_release_date": "2016-06-21T10:32:29Z",
"generator": {
"date": "2016-06-21T10:32:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:1645-1",
"initial_release_date": "2016-06-21T10:32:29Z",
"revision_history": [
{
"date": "2016-06-21T10:32:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-1.1.5-0.17.2.i586",
"product": {
"name": "pam-devel-1.1.5-0.17.2.i586",
"product_id": "pam-devel-1.1.5-0.17.2.i586"
}
},
{
"category": "product_version",
"name": "pam-1.1.5-0.17.2.i586",
"product": {
"name": "pam-1.1.5-0.17.2.i586",
"product_id": "pam-1.1.5-0.17.2.i586"
}
},
{
"category": "product_version",
"name": "pam-doc-1.1.5-0.17.2.i586",
"product": {
"name": "pam-doc-1.1.5-0.17.2.i586",
"product_id": "pam-doc-1.1.5-0.17.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-1.1.5-0.17.2.ia64",
"product": {
"name": "pam-devel-1.1.5-0.17.2.ia64",
"product_id": "pam-devel-1.1.5-0.17.2.ia64"
}
},
{
"category": "product_version",
"name": "pam-1.1.5-0.17.2.ia64",
"product": {
"name": "pam-1.1.5-0.17.2.ia64",
"product_id": "pam-1.1.5-0.17.2.ia64"
}
},
{
"category": "product_version",
"name": "pam-doc-1.1.5-0.17.2.ia64",
"product": {
"name": "pam-doc-1.1.5-0.17.2.ia64",
"product_id": "pam-doc-1.1.5-0.17.2.ia64"
}
},
{
"category": "product_version",
"name": "pam-x86-1.1.5-0.17.2.ia64",
"product": {
"name": "pam-x86-1.1.5-0.17.2.ia64",
"product_id": "pam-x86-1.1.5-0.17.2.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-1.1.5-0.17.2.ppc64",
"product": {
"name": "pam-devel-1.1.5-0.17.2.ppc64",
"product_id": "pam-devel-1.1.5-0.17.2.ppc64"
}
},
{
"category": "product_version",
"name": "pam-devel-32bit-1.1.5-0.17.2.ppc64",
"product": {
"name": "pam-devel-32bit-1.1.5-0.17.2.ppc64",
"product_id": "pam-devel-32bit-1.1.5-0.17.2.ppc64"
}
},
{
"category": "product_version",
"name": "pam-1.1.5-0.17.2.ppc64",
"product": {
"name": "pam-1.1.5-0.17.2.ppc64",
"product_id": "pam-1.1.5-0.17.2.ppc64"
}
},
{
"category": "product_version",
"name": "pam-32bit-1.1.5-0.17.2.ppc64",
"product": {
"name": "pam-32bit-1.1.5-0.17.2.ppc64",
"product_id": "pam-32bit-1.1.5-0.17.2.ppc64"
}
},
{
"category": "product_version",
"name": "pam-doc-1.1.5-0.17.2.ppc64",
"product": {
"name": "pam-doc-1.1.5-0.17.2.ppc64",
"product_id": "pam-doc-1.1.5-0.17.2.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-1.1.5-0.17.2.s390x",
"product": {
"name": "pam-devel-1.1.5-0.17.2.s390x",
"product_id": "pam-devel-1.1.5-0.17.2.s390x"
}
},
{
"category": "product_version",
"name": "pam-devel-32bit-1.1.5-0.17.2.s390x",
"product": {
"name": "pam-devel-32bit-1.1.5-0.17.2.s390x",
"product_id": "pam-devel-32bit-1.1.5-0.17.2.s390x"
}
},
{
"category": "product_version",
"name": "pam-1.1.5-0.17.2.s390x",
"product": {
"name": "pam-1.1.5-0.17.2.s390x",
"product_id": "pam-1.1.5-0.17.2.s390x"
}
},
{
"category": "product_version",
"name": "pam-32bit-1.1.5-0.17.2.s390x",
"product": {
"name": "pam-32bit-1.1.5-0.17.2.s390x",
"product_id": "pam-32bit-1.1.5-0.17.2.s390x"
}
},
{
"category": "product_version",
"name": "pam-doc-1.1.5-0.17.2.s390x",
"product": {
"name": "pam-doc-1.1.5-0.17.2.s390x",
"product_id": "pam-doc-1.1.5-0.17.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pam-devel-1.1.5-0.17.2.x86_64",
"product": {
"name": "pam-devel-1.1.5-0.17.2.x86_64",
"product_id": "pam-devel-1.1.5-0.17.2.x86_64"
}
},
{
"category": "product_version",
"name": "pam-devel-32bit-1.1.5-0.17.2.x86_64",
"product": {
"name": "pam-devel-32bit-1.1.5-0.17.2.x86_64",
"product_id": "pam-devel-32bit-1.1.5-0.17.2.x86_64"
}
},
{
"category": "product_version",
"name": "pam-1.1.5-0.17.2.x86_64",
"product": {
"name": "pam-1.1.5-0.17.2.x86_64",
"product_id": "pam-1.1.5-0.17.2.x86_64"
}
},
{
"category": "product_version",
"name": "pam-32bit-1.1.5-0.17.2.x86_64",
"product": {
"name": "pam-32bit-1.1.5-0.17.2.x86_64",
"product_id": "pam-32bit-1.1.5-0.17.2.x86_64"
}
},
{
"category": "product_version",
"name": "pam-doc-1.1.5-0.17.2.x86_64",
"product": {
"name": "pam-doc-1.1.5-0.17.2.x86_64",
"product_id": "pam-doc-1.1.5-0.17.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.1.5-0.17.2.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.i586"
},
"product_reference": "pam-devel-1.1.5-0.17.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.1.5-0.17.2.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ia64"
},
"product_reference": "pam-devel-1.1.5-0.17.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.1.5-0.17.2.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ppc64"
},
"product_reference": "pam-devel-1.1.5-0.17.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.1.5-0.17.2.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.s390x"
},
"product_reference": "pam-devel-1.1.5-0.17.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-1.1.5-0.17.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.x86_64"
},
"product_reference": "pam-devel-1.1.5-0.17.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-32bit-1.1.5-0.17.2.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.ppc64"
},
"product_reference": "pam-devel-32bit-1.1.5-0.17.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-32bit-1.1.5-0.17.2.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.s390x"
},
"product_reference": "pam-devel-32bit-1.1.5-0.17.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-devel-32bit-1.1.5-0.17.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.x86_64"
},
"product_reference": "pam-devel-32bit-1.1.5-0.17.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.i586"
},
"product_reference": "pam-1.1.5-0.17.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ia64"
},
"product_reference": "pam-1.1.5-0.17.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ppc64"
},
"product_reference": "pam-1.1.5-0.17.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.s390x"
},
"product_reference": "pam-1.1.5-0.17.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.x86_64"
},
"product_reference": "pam-1.1.5-0.17.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.1.5-0.17.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64"
},
"product_reference": "pam-32bit-1.1.5-0.17.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.1.5-0.17.2.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.s390x"
},
"product_reference": "pam-32bit-1.1.5-0.17.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.1.5-0.17.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64"
},
"product_reference": "pam-32bit-1.1.5-0.17.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.i586"
},
"product_reference": "pam-doc-1.1.5-0.17.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ia64"
},
"product_reference": "pam-doc-1.1.5-0.17.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ppc64"
},
"product_reference": "pam-doc-1.1.5-0.17.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.s390x"
},
"product_reference": "pam-doc-1.1.5-0.17.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.x86_64"
},
"product_reference": "pam-doc-1.1.5-0.17.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-x86-1.1.5-0.17.2.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:pam-x86-1.1.5-0.17.2.ia64"
},
"product_reference": "pam-x86-1.1.5-0.17.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.i586"
},
"product_reference": "pam-1.1.5-0.17.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ia64"
},
"product_reference": "pam-1.1.5-0.17.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ppc64"
},
"product_reference": "pam-1.1.5-0.17.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.s390x"
},
"product_reference": "pam-1.1.5-0.17.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-1.1.5-0.17.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.x86_64"
},
"product_reference": "pam-1.1.5-0.17.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.1.5-0.17.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64"
},
"product_reference": "pam-32bit-1.1.5-0.17.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.1.5-0.17.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.s390x"
},
"product_reference": "pam-32bit-1.1.5-0.17.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-32bit-1.1.5-0.17.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64"
},
"product_reference": "pam-32bit-1.1.5-0.17.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.i586"
},
"product_reference": "pam-doc-1.1.5-0.17.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ia64"
},
"product_reference": "pam-doc-1.1.5-0.17.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ppc64"
},
"product_reference": "pam-doc-1.1.5-0.17.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.s390x"
},
"product_reference": "pam-doc-1.1.5-0.17.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-doc-1.1.5-0.17.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.x86_64"
},
"product_reference": "pam-doc-1.1.5-0.17.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam-x86-1.1.5-0.17.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-x86-1.1.5-0.17.2.ia64"
},
"product_reference": "pam-x86-1.1.5-0.17.2.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-7041",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-7041"
}
],
"notes": [
{
"category": "general",
"text": "The pam_userdb module for Pam uses a case-insensitive method to compare hashed passwords, which makes it easier for attackers to guess the password via a brute force attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-7041",
"url": "https://www.suse.com/security/cve/CVE-2013-7041"
},
{
"category": "external",
"summary": "SUSE Bug 1123794 for CVE-2013-7041",
"url": "https://bugzilla.suse.com/1123794"
},
{
"category": "external",
"summary": "SUSE Bug 1215217 for CVE-2013-7041",
"url": "https://bugzilla.suse.com/1215217"
},
{
"category": "external",
"summary": "SUSE Bug 854480 for CVE-2013-7041",
"url": "https://bugzilla.suse.com/854480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-06-21T10:32:29Z",
"details": "moderate"
}
],
"title": "CVE-2013-7041"
},
{
"cve": "CVE-2015-3238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3238"
}
],
"notes": [
{
"category": "general",
"text": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3238",
"url": "https://www.suse.com/security/cve/CVE-2015-3238"
},
{
"category": "external",
"summary": "SUSE Bug 1123794 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/1123794"
},
{
"category": "external",
"summary": "SUSE Bug 934920 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/934920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-32bit-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-doc-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:pam-x86-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-1.1.5-0.17.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:pam-devel-32bit-1.1.5-0.17.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-06-21T10:32:29Z",
"details": "moderate"
}
],
"title": "CVE-2015-3238"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.