Action not permitted
Modal body text goes here.
cve-2011-4108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:49.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "48528", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48528" }, { "name": "57260", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57260" }, { "name": "HPSBMU02786", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564" }, { "name": "openSUSE-SU-2012:0083", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" }, { "name": "MDVSA-2012:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006" }, { "name": "FEDORA-2012-18035", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openssl.org/news/secadv_20120104.txt" }, { "name": "SUSE-SU-2012:0084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" }, { "name": "RHSA-2012:1308", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html" }, { "name": "RHSA-2012:1307", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.isg.rhul.ac.uk/~kp/dtls.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5784" }, { "name": "SUSE-SU-2014:0320", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "name": "APPLE-SA-2013-06-04-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "name": "VU#737740", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/737740" }, { "name": "HPSBUX02734", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2" }, { "name": "MDVSA-2012:007", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007" }, { "name": "RHSA-2012:1306", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html" }, { "name": "HPSBOV02793", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2" }, { "name": "57353", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57353" }, { "name": "SSRT100891", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2" }, { "name": "SSRT100852", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "name": "SSRT100729", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2" }, { "name": "SSRT100877", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "DSA-2390", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2390" }, { "name": "HPSBMU02776", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2011-4108" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-17T16:03:43", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "48528", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48528" }, { "name": "57260", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57260" }, { "name": "HPSBMU02786", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564" }, { "name": "openSUSE-SU-2012:0083", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" }, { "name": "MDVSA-2012:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006" }, { "name": "FEDORA-2012-18035", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openssl.org/news/secadv_20120104.txt" }, { "name": "SUSE-SU-2012:0084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" }, { "name": "RHSA-2012:1308", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html" }, { "name": "RHSA-2012:1307", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.isg.rhul.ac.uk/~kp/dtls.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5784" }, { "name": "SUSE-SU-2014:0320", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "name": "APPLE-SA-2013-06-04-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "name": "VU#737740", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/737740" }, { "name": "HPSBUX02734", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2" }, { "name": "MDVSA-2012:007", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007" }, { "name": "RHSA-2012:1306", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html" }, { "name": "HPSBOV02793", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2" }, { "name": "57353", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57353" }, { "name": "SSRT100891", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2" }, { "name": "SSRT100852", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "name": "SSRT100729", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2" }, { "name": "SSRT100877", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "DSA-2390", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2390" }, { "name": "HPSBMU02776", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2011-4108" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-4108", "datePublished": "2012-01-06T01:00:00", "dateReserved": "2011-10-18T00:00:00", "dateUpdated": "2024-08-07T00:01:49.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-4108\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-01-06T01:55:00.783\",\"lastModified\":\"2016-08-23T02:04:34.680\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n DTLS en OpenSSL antes de v0.9.8s y v1.x antes de v1.0.0f realiza una comprobaci\u00f3n de MAC s\u00f3lo si determinado relleno es v\u00e1lida, lo que facilita a los atacantes remotos a la hora de recuperar texto a trav\u00e9s de un ataque de relleno.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.9.8r\",\"matchCriteriaId\":\"D22F36D1-6773-4D86-A9B7-69693EFAEFB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D983EC-61B0-4FD9-89B5-9878E4CE4405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EDB5A09-BE86-4352-9799-A875649EDB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F03FA9C0-24C7-46AC-92EC-7834BC34C79B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E4742C-A983-4F00-B24F-AB280C0E876D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0628DF-3A4C-4078-B615-22260671EABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962FCB86-15AD-4399-8B7D-EC1DEA919C59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180D07AE-C571-4DD6-837C-43E2A946007A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90789533-C741-4B1C-A24B-2C77B9E4DE5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1520065B-46D7-48A4-B9D0-5B49F690C5B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6h:bogus:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C6B8F4-DA78-4E92-8660-5F20FCADD0DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AA526B9-726A-49D5-B3CA-EBE2DA303CA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494E48E7-EF86-4860-9A53-94F6C313746E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2636B92E-47D5-42EA-9585-A2B84FBE71CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72FE2F46-2D0C-4C90-AFBE-D2E7B496D6E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A518E8-21BE-4C5C-B425-410AB1208E9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E79A05-64F3-4397-952C-A5BB950C967D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"549BB01D-F322-4FE3-BDA2-4FEA8ED8568A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98693865-2E79-4BD6-9F89-1994BC9A3E73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6476506-EC37-4726-82DC-D0E8254A8CDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6ECEF7-CB16-4604-894B-6EB19F1CEF55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C81EF3D-4DB7-4799-9670-8D79E28CA184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8116A66-175C-4E6D-9A9B-D54C1D97D213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"382C1679-DA1D-4FA4-9D5E-B86CC5052D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CA28812-8A24-4FE1-BED9-D6D5BB023645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9894D83E-2A27-446E-8B47-9C03CF802A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A9AC4D-E19B-431F-8679-B62F5F46BCF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4E446D-B9D3-45F2-9722-B41FA14A6C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4EA988-FC80-4170-8933-7C6663731981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F8F53B-24A1-4877-B16E-F1917C4E4E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75D3ACD5-905F-42BB-BE1A-8382E9D823BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766EA6F2-7FA4-4713-9859-9971CCD2FDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB38AEA-BAF0-4920-9A71-747C24444770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F33EA2B-DE15-4695-A383-7A337AC38908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261EE631-AB43-44FE-B02A-DFAAB8D35927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0E0BBF-D0BE-41A7-B9BB-C28F01000BC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1365ED-4651-4AB2-A64B-43782EA2F0E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC82690C-DCED-47BA-AA93-4D0C9E95B806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B90ED1-DAB4-4239-8AD8-87E8D568D5D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C9BF2DD-85EF-49CF-8D83-0DB46449E333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86C46AB8-52E5-4385-9C5C-F63FF9DB82AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"564AA4E7-223E-48D8-B3E0-A461969CF530\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82CFB41-BEA5-4B5F-BCAA-9BAED22EEAF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35C2AE06-B6E8-41C4-BB60-177AC4819CE6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.0e\",\"matchCriteriaId\":\"A0823F96-5158-4A55-BBB3-FA10868E9B6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2075BD-6102-4B0F-839A-836E9585F43B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A2FA09E-2BF7-4968-B62D-00DA57F81EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02E634E-1E3D-4E44-BADA-76F92483A732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC2B07A-49EF-411F-8A4D-89435E22B043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E9480D6-3B6A-4C41-B8C1-C3F945040772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FF0A06-DA61-4250-B083-67E55E362677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6BA453-C150-4159-B80B-5465EFF83F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638A2E69-8AB6-4FEA-852A-FEF16A500C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C47D3A-B99D-401D-B6B8-1194B2DB4809\"}]}]}],\"references\":[{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1306.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1307.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1308.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48528\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57260\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57353\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT5784\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2390\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.isg.rhul.ac.uk/~kp/dtls.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/737740\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:006\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:007\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openssl.org/news/secadv_20120104.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2011-4108\",\"source\":\"secalert@redhat.com\"}]}}" } }
rhsa-2012_1306
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the OpenSSL component for JBoss Enterprise Web Server 1.0.2\nfor Solaris and Microsoft Windows that fixes multiple security issues is\nnow available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nMultiple numeric conversion errors, leading to a buffer overflow, were\nfound in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data\nfrom BIO (OpenSSL\u0027s I/O abstraction) inputs. Specially-crafted DER\n(Distinguished Encoding Rules) encoded data read from a file or other BIO\ninput could cause an application using the OpenSSL library to crash or,\npotentially, execute arbitrary code. (CVE-2012-2110)\n\nA double free flaw was discovered in the policy checking code in OpenSSL.\nA remote attacker could use this flaw to crash an application that uses\nOpenSSL by providing an X.509 certificate that has specially-crafted\npolicy extension data. (CVE-2011-4109)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection.\n(CVE-2011-4576)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake.\n(CVE-2011-4619)\n\nThis update also fixes additional security issues in OpenSSL that are not\nexposed in JBoss Enterprise Web Server: CVE-2011-4108, CVE-2012-0884,\nCVE-2012-1165, and CVE-2012-2333.\n\nWarning: Before applying the update, back up your existing JBoss Enterprise\nWeb Server installation (including all applications and configuration\nfiles).\n\nAll users of JBoss Enterprise Web Server 1.0.2 for Solaris and Microsoft\nWindows as provided from the Red Hat Customer Portal are advised to apply\nthis update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1306", "url": "https://access.redhat.com/errata/RHSA-2012:1306" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2" }, { "category": "external", "summary": "771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "771771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" }, { "category": "external", "summary": "771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "802489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802489" }, { "category": "external", "summary": "802725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802725" }, { "category": "external", "summary": "814185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814185" }, { "category": "external", "summary": "820686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1306.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-05T17:51:59+00:00", "generator": { "date": "2024-11-05T17:51:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:1306", "initial_release_date": "2012-09-24T15:52:00+00:00", "revision_history": [ { "date": "2012-09-24T15:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:44:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:51:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0", "product": { "name": "Red Hat JBoss Web Server 1.0", "product_id": "Red Hat JBoss Web Server 1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4108", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771770" } ], "notes": [ { "category": "description", "text": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DTLS plaintext recovery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 as they do not include support for DTLS protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4108" }, { "category": "external", "summary": "RHBZ#771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4108", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:52:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DTLS plaintext recovery attack" }, { "cve": "CVE-2011-4109", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771771" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: double-free in policy checks", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 and 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4109" }, { "category": "external", "summary": "RHBZ#771771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4109", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:52:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: double-free in policy checks" }, { "cve": "CVE-2011-4576", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771775" } ], "notes": [ { "category": "description", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: uninitialized SSL 3.0 padding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "RHBZ#771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4576", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4576" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:52:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: uninitialized SSL 3.0 padding" }, { "cve": "CVE-2011-4619", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771780" } ], "notes": [ { "category": "description", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SGC restart DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "RHBZ#771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:52:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SGC restart DoS attack" }, { "cve": "CVE-2012-0884", "discovery_date": "2012-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "802725" } ], "notes": [ { "category": "description", "text": "The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: CMS and PKCS#7 Bleichenbacher attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0884" }, { "category": "external", "summary": "RHBZ#802725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0884", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0884" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20120312.txt", "url": "http://www.openssl.org/news/secadv_20120312.txt" } ], "release_date": "2012-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:52:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: CMS and PKCS#7 Bleichenbacher attack" }, { "cve": "CVE-2012-1165", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2012-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "802489" } ], "notes": [ { "category": "description", "text": "The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: mime_param_cmp NULL dereference crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1165" }, { "category": "external", "summary": "RHBZ#802489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1165" } ], "release_date": "2012-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:52:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: mime_param_cmp NULL dereference crash" }, { "cve": "CVE-2012-2110", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-04-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "814185" } ], "notes": [ { "category": "description", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: asn1_d2i_read_bio integer errors leading to buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2110" }, { "category": "external", "summary": "RHBZ#814185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2110", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2110" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2110", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2110" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20120419.txt", "url": "http://www.openssl.org/news/secadv_20120419.txt" } ], "release_date": "2012-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:52:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: asn1_d2i_read_bio integer errors leading to buffer overflow" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Codenomicon" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2012-2333", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2012-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "820686" } ], "notes": [ { "category": "description", "text": "Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: record length handling integer underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3 and 4. The openssl versions in Red Hat Enterprise Linux 5 and 6 were partially affected, as they support DTLS, but they do not support TLS 1.1 and TLS 1.2. This issue was addressed in Red Hat Enterprise Linux 5 and 6 via RHSA-2012:0699.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2333" }, { "category": "external", "summary": "RHBZ#820686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2333", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2333" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2333", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2333" }, { "category": "external", "summary": "http://openssl.org/news/secadv_20120510.txt", "url": "http://openssl.org/news/secadv_20120510.txt" } ], "release_date": "2012-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:52:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1306" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: record length handling integer underflow" } ] }
rhsa-2012_1307
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the OpenSSL component for JBoss Enterprise Application\nPlatform 5.1.2 for Solaris and Microsoft Windows that fixes multiple\nsecurity issues is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nMultiple numeric conversion errors, leading to a buffer overflow, were\nfound in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data\nfrom BIO (OpenSSL\u0027s I/O abstraction) inputs. Specially-crafted DER\n(Distinguished Encoding Rules) encoded data read from a file or other BIO\ninput could cause an application using the OpenSSL library to crash or,\npotentially, execute arbitrary code. (CVE-2012-2110)\n\nA double free flaw was discovered in the policy checking code in OpenSSL.\nA remote attacker could use this flaw to crash an application that uses\nOpenSSL by providing an X.509 certificate that has specially-crafted\npolicy extension data. (CVE-2011-4109)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection.\n(CVE-2011-4576)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake.\n(CVE-2011-4619)\n\nThis update also fixes additional security issues in OpenSSL that are not\nexposed in JBoss Enterprise Application Platform: CVE-2011-4108,\nCVE-2012-0884, CVE-2012-1165, and CVE-2012-2333.\n\nWarning: Before applying this update, back up your JBoss Enterprise\nApplication Platform\u0027s \"server/[PROFILE]/deploy/\" directory, along with all\nother customized configuration files.\n\nAll users of JBoss Enterprise Application Platform 5.1.2 for Solaris and\nMicrosoft Windows as provided from the Red Hat Customer Portal are advised\nto apply this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1307", "url": "https://access.redhat.com/errata/RHSA-2012:1307" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=5.1.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=5.1.2" }, { "category": "external", "summary": "771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "771771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" }, { "category": "external", "summary": "771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "802489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802489" }, { "category": "external", "summary": "802725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802725" }, { "category": "external", "summary": "814185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814185" }, { "category": "external", "summary": "820686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1307.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-05T17:52:03+00:00", "generator": { "date": "2024-11-05T17:52:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:1307", "initial_release_date": "2012-09-24T15:53:00+00:00", "revision_history": [ { "date": "2012-09-24T15:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:45:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:52:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product_id": "Red Hat JBoss Enterprise Application Platform 5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4108", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771770" } ], "notes": [ { "category": "description", "text": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DTLS plaintext recovery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 as they do not include support for DTLS protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4108" }, { "category": "external", "summary": "RHBZ#771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4108", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:53:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation (including all\napplications and configuration files).\n\nJBoss server instances configured to use the Tomcat Native library must be\nrestarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DTLS plaintext recovery attack" }, { "cve": "CVE-2011-4109", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771771" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: double-free in policy checks", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 and 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4109" }, { "category": "external", "summary": "RHBZ#771771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4109", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:53:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation (including all\napplications and configuration files).\n\nJBoss server instances configured to use the Tomcat Native library must be\nrestarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: double-free in policy checks" }, { "cve": "CVE-2011-4576", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771775" } ], "notes": [ { "category": "description", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: uninitialized SSL 3.0 padding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "RHBZ#771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4576", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4576" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:53:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation (including all\napplications and configuration files).\n\nJBoss server instances configured to use the Tomcat Native library must be\nrestarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: uninitialized SSL 3.0 padding" }, { "cve": "CVE-2011-4619", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771780" } ], "notes": [ { "category": "description", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SGC restart DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "RHBZ#771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:53:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation (including all\napplications and configuration files).\n\nJBoss server instances configured to use the Tomcat Native library must be\nrestarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SGC restart DoS attack" }, { "cve": "CVE-2012-0884", "discovery_date": "2012-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "802725" } ], "notes": [ { "category": "description", "text": "The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: CMS and PKCS#7 Bleichenbacher attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0884" }, { "category": "external", "summary": "RHBZ#802725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0884", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0884" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20120312.txt", "url": "http://www.openssl.org/news/secadv_20120312.txt" } ], "release_date": "2012-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:53:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation (including all\napplications and configuration files).\n\nJBoss server instances configured to use the Tomcat Native library must be\nrestarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: CMS and PKCS#7 Bleichenbacher attack" }, { "cve": "CVE-2012-1165", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2012-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "802489" } ], "notes": [ { "category": "description", "text": "The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: mime_param_cmp NULL dereference crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1165" }, { "category": "external", "summary": "RHBZ#802489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1165" } ], "release_date": "2012-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:53:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation (including all\napplications and configuration files).\n\nJBoss server instances configured to use the Tomcat Native library must be\nrestarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: mime_param_cmp NULL dereference crash" }, { "cve": "CVE-2012-2110", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-04-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "814185" } ], "notes": [ { "category": "description", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: asn1_d2i_read_bio integer errors leading to buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2110" }, { "category": "external", "summary": "RHBZ#814185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2110", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2110" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2110", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2110" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20120419.txt", "url": "http://www.openssl.org/news/secadv_20120419.txt" } ], "release_date": "2012-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:53:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation (including all\napplications and configuration files).\n\nJBoss server instances configured to use the Tomcat Native library must be\nrestarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: asn1_d2i_read_bio integer errors leading to buffer overflow" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Codenomicon" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2012-2333", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2012-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "820686" } ], "notes": [ { "category": "description", "text": "Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: record length handling integer underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3 and 4. The openssl versions in Red Hat Enterprise Linux 5 and 6 were partially affected, as they support DTLS, but they do not support TLS 1.1 and TLS 1.2. This issue was addressed in Red Hat Enterprise Linux 5 and 6 via RHSA-2012:0699.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2333" }, { "category": "external", "summary": "RHBZ#820686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2333", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2333" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2333", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2333" }, { "category": "external", "summary": "http://openssl.org/news/secadv_20120510.txt", "url": "http://openssl.org/news/secadv_20120510.txt" } ], "release_date": "2012-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:53:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation (including all\napplications and configuration files).\n\nJBoss server instances configured to use the Tomcat Native library must be\nrestarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1307" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: record length handling integer underflow" } ] }
rhsa-2012_0060
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that the Datagram Transport Layer Security (DTLS)\nprotocol implementation in OpenSSL leaked timing information when\nperforming certain operations. A remote attacker could possibly use this\nflaw to retrieve plain text from the encrypted packets by using a DTLS\nserver as a padding oracle. (CVE-2011-4108)\n\nA double free flaw was discovered in the policy checking code in OpenSSL.\nA remote attacker could use this flaw to crash an application that uses\nOpenSSL by providing an X.509 certificate that has specially-crafted\npolicy extension data. (CVE-2011-4109)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection.\n(CVE-2011-4576)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake.\n(CVE-2011-4619)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0060", "url": "https://access.redhat.com/errata/RHSA-2012:0060" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "771771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" }, { "category": "external", "summary": "771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0060.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-05T17:40:45+00:00", "generator": { "date": "2024-11-05T17:40:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:0060", "initial_release_date": "2012-01-24T20:59:00+00:00", "revision_history": [ { "date": "2012-01-24T20:59:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-01-24T21:02:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:40:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "RHEL Desktop Workstation (v. 5 client)", "product": { "name": "RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:0.9.8e-20.el5_7.1.i386", "product": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.i386", "product_id": "openssl-perl-0:0.9.8e-20.el5_7.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-20.el5_7.1?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.i386", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.i386", "product_id": "openssl-0:0.9.8e-20.el5_7.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "product": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "product_id": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-20.el5_7.1?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-20.el5_7.1.i386", "product": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.i386", "product_id": "openssl-devel-0:0.9.8e-20.el5_7.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-20.el5_7.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.i686", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.i686", "product_id": "openssl-0:0.9.8e-20.el5_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "product": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "product_id": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-20.el5_7.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "product": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "product_id": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-20.el5_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.x86_64", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.x86_64", "product_id": "openssl-0:0.9.8e-20.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "product_id": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-20.el5_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "product": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "product_id": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-20.el5_7.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.src", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.src", "product_id": "openssl-0:0.9.8e-20.el5_7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "product": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "product_id": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-20.el5_7.1?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.ia64", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.ia64", "product_id": "openssl-0:0.9.8e-20.el5_7.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "product": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "product_id": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-20.el5_7.1?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "product": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "product_id": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-20.el5_7.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "product": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "product_id": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-20.el5_7.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.ppc", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.ppc", "product_id": "openssl-0:0.9.8e-20.el5_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "product": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "product_id": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-20.el5_7.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "product": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "product_id": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-20.el5_7.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.ppc64", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.ppc64", "product_id": "openssl-0:0.9.8e-20.el5_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "product_id": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-20.el5_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "product": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "product_id": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-20.el5_7.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "product": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "product_id": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-20.el5_7.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.s390x", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.s390x", "product_id": "openssl-0:0.9.8e-20.el5_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "product": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "product_id": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-20.el5_7.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "product": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "product_id": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-20.el5_7.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-20.el5_7.1.s390", "product": { "name": "openssl-0:0.9.8e-20.el5_7.1.s390", "product_id": "openssl-0:0.9.8e-20.el5_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-20.el5_7.1?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "product": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "product_id": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-20.el5_7.1?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390", "product": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390", "product_id": "openssl-devel-0:0.9.8e-20.el5_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-20.el5_7.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.src", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.i686 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.i686", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.src as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.src", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.src", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-20.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "relates_to_product_reference": "5Server-5.7.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4108", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771770" } ], "notes": [ { "category": "description", "text": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DTLS plaintext recovery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 as they do not include support for DTLS protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4108" }, { "category": "external", "summary": "RHBZ#771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4108", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-24T20:59:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0060" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DTLS plaintext recovery attack" }, { "cve": "CVE-2011-4109", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771771" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: double-free in policy checks", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 and 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4109" }, { "category": "external", "summary": "RHBZ#771771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4109", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-24T20:59:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0060" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: double-free in policy checks" }, { "cve": "CVE-2011-4576", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771775" } ], "notes": [ { "category": "description", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: uninitialized SSL 3.0 padding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "RHBZ#771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4576", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4576" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-24T20:59:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0060" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: uninitialized SSL 3.0 padding" }, { "cve": "CVE-2011-4619", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771780" } ], "notes": [ { "category": "description", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SGC restart DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "RHBZ#771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-24T20:59:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0060" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Client-Workstation-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Client-Workstation-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.src", "5Server-5.7.Z:openssl-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.i686", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-debuginfo-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.ppc64", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-devel-0:0.9.8e-20.el5_7.1.x86_64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.i386", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ia64", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.ppc", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.s390x", "5Server-5.7.Z:openssl-perl-0:0.9.8e-20.el5_7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SGC restart DoS attack" } ] }
rhsa-2012_0059
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that the Datagram Transport Layer Security (DTLS)\nprotocol implementation in OpenSSL leaked timing information when\nperforming certain operations. A remote attacker could possibly use this\nflaw to retrieve plain text from the encrypted packets by using a DTLS\nserver as a padding oracle. (CVE-2011-4108)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection.\n(CVE-2011-4576)\n\nA denial of service flaw was found in the RFC 3779 implementation in\nOpenSSL. A remote attacker could use this flaw to make an application using\nOpenSSL exit unexpectedly by providing a specially-crafted X.509\ncertificate that has malformed RFC 3779 extension data. (CVE-2011-4577)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake.\n(CVE-2011-4619)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0059", "url": "https://access.redhat.com/errata/RHSA-2012:0059" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "771778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771778" }, { "category": "external", "summary": "771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0059.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-05T17:40:53+00:00", "generator": { "date": "2024-11-05T17:40:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:0059", "initial_release_date": "2012-01-24T21:00:00+00:00", "revision_history": [ { "date": "2012-01-24T21:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-01-24T21:03:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:40:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "product": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "product_id": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-20.el6_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "product": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "product_id": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-20.el6_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "product": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "product_id": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-20.el6_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "product_id": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-20.el6_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.1.x86_64", "product": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64", "product_id": "openssl-0:1.0.0-20.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "product": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "product_id": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-20.el6_2.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "product": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "product_id": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-20.el6_2.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-20.el6_2.1.i686", "product": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686", "product_id": "openssl-static-0:1.0.0-20.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-20.el6_2.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "product": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "product_id": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-20.el6_2.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.1.i686", "product": { "name": "openssl-0:1.0.0-20.el6_2.1.i686", "product_id": "openssl-0:1.0.0-20.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.1.src", "product": { "name": "openssl-0:1.0.0-20.el6_2.1.src", "product_id": "openssl-0:1.0.0-20.el6_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "product": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "product_id": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-20.el6_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "product": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "product_id": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-20.el6_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "product_id": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-20.el6_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "product": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "product_id": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-20.el6_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.1.ppc64", "product": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64", "product_id": "openssl-0:1.0.0-20.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "product": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "product_id": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-20.el6_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "product": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "product_id": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-20.el6_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "product": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "product_id": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-20.el6_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "product": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "product_id": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-20.el6_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.1.s390x", "product": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x", "product_id": "openssl-0:1.0.0-20.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "product": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "product_id": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-20.el6_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.1.ppc", "product": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc", "product_id": "openssl-0:1.0.0-20.el6_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "product": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "product_id": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-20.el6_2.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "product": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "product_id": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-20.el6_2.1?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.1.s390", "product": { "name": "openssl-0:1.0.0-20.el6_2.1.s390", "product_id": "openssl-0:1.0.0-20.el6_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.1?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "product": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "product_id": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-20.el6_2.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.src", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.src", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.src", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.src", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.src", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.src", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.src", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4108", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771770" } ], "notes": [ { "category": "description", "text": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DTLS plaintext recovery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 as they do not include support for DTLS protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4108" }, { "category": "external", "summary": "RHBZ#771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4108", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-24T21:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0059" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DTLS plaintext recovery attack" }, { "cve": "CVE-2011-4576", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771775" } ], "notes": [ { "category": "description", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: uninitialized SSL 3.0 padding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "RHBZ#771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4576", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4576" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-24T21:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0059" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: uninitialized SSL 3.0 padding" }, { "cve": "CVE-2011-4577", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771778" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: malformed RFC 3779 data can cause assertion failures", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3, 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4577" }, { "category": "external", "summary": "RHBZ#771778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4577", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4577" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-24T21:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0059" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: malformed RFC 3779 data can cause assertion failures" }, { "cve": "CVE-2011-4619", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771780" } ], "notes": [ { "category": "description", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SGC restart DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "RHBZ#771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-24T21:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0059" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Client-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Client-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6ComputeNode-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Server-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Server-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.src", "6Workstation-optional-6.2.z:openssl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-debuginfo-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-devel-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-perl-0:1.0.0-20.el6_2.1.x86_64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.i686", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.ppc64", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.s390x", "6Workstation-optional-6.2.z:openssl-static-0:1.0.0-20.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SGC restart DoS attack" } ] }
rhsa-2012_1308
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the OpenSSL component for JBoss Enterprise Application\nPlatform 6.0.0 for Solaris and Microsoft Windows that fixes multiple\nsecurity issues is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nMultiple numeric conversion errors, leading to a buffer overflow, were\nfound in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data\nfrom BIO (OpenSSL\u0027s I/O abstraction) inputs. Specially-crafted DER\n(Distinguished Encoding Rules) encoded data read from a file or other BIO\ninput could cause an application using the OpenSSL library to crash or,\npotentially, execute arbitrary code. (CVE-2012-2110)\n\nA double free flaw was discovered in the policy checking code in OpenSSL.\nA remote attacker could use this flaw to crash an application that uses\nOpenSSL by providing an X.509 certificate that has specially-crafted\npolicy extension data. (CVE-2011-4109)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection.\n(CVE-2011-4576)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake.\n(CVE-2011-4619)\n\nThis update also fixes additional security issues in OpenSSL that are not\nexposed in JBoss Enterprise Application Platform: CVE-2011-4108,\nCVE-2012-0884, CVE-2012-1165, and CVE-2012-2333.\n\nWarning: Before applying this update, back up your existing JBoss\nEnterprise Application Platform installation and deployed applications, and\nalso back up your existing Apache HTTP Server installation (including all\napplications and configuration files).\n\nAll users of JBoss Enterprise Application Platform 6.0.0 for Solaris and\nMicrosoft Windows as provided from the Red Hat Customer Portal are advised\nto apply this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1308", "url": "https://access.redhat.com/errata/RHSA-2012:1308" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.0.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.0.0" }, { "category": "external", "summary": "771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "771771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" }, { "category": "external", "summary": "771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "802489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802489" }, { "category": "external", "summary": "802725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802725" }, { "category": "external", "summary": "814185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814185" }, { "category": "external", "summary": "820686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1308.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-05T17:52:07+00:00", "generator": { "date": "2024-11-05T17:52:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:1308", "initial_release_date": "2012-09-24T15:55:00+00:00", "revision_history": [ { "date": "2012-09-24T15:55:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:44:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:52:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.0", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.0", "product_id": "Red Hat JBoss Enterprise Application Platform 6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4108", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771770" } ], "notes": [ { "category": "description", "text": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DTLS plaintext recovery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 as they do not include support for DTLS protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4108" }, { "category": "external", "summary": "RHBZ#771770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4108", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:55:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation and deployed\napplications, and also back up your existing Apache HTTP Server\ninstallation (including all applications and configuration files).\n\nThe Apache HTTP Server, as well as JBoss server instances configured to use\nthe Tomcat Native library, must be restarted for this update to take\neffect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1308" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DTLS plaintext recovery attack" }, { "cve": "CVE-2011-4109", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771771" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: double-free in policy checks", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 and 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4109" }, { "category": "external", "summary": "RHBZ#771771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4109", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4109" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:55:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation and deployed\napplications, and also back up your existing Apache HTTP Server\ninstallation (including all applications and configuration files).\n\nThe Apache HTTP Server, as well as JBoss server instances configured to use\nthe Tomcat Native library, must be restarted for this update to take\neffect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1308" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: double-free in policy checks" }, { "cve": "CVE-2011-4576", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771775" } ], "notes": [ { "category": "description", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: uninitialized SSL 3.0 padding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "RHBZ#771775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771775" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4576", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4576" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4576" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:55:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation and deployed\napplications, and also back up your existing Apache HTTP Server\ninstallation (including all applications and configuration files).\n\nThe Apache HTTP Server, as well as JBoss server instances configured to use\nthe Tomcat Native library, must be restarted for this update to take\neffect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1308" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: uninitialized SSL 3.0 padding" }, { "cve": "CVE-2011-4619", "discovery_date": "2012-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771780" } ], "notes": [ { "category": "description", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SGC restart DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "RHBZ#771780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4619", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4619" } ], "release_date": "2012-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:55:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation and deployed\napplications, and also back up your existing Apache HTTP Server\ninstallation (including all applications and configuration files).\n\nThe Apache HTTP Server, as well as JBoss server instances configured to use\nthe Tomcat Native library, must be restarted for this update to take\neffect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1308" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SGC restart DoS attack" }, { "cve": "CVE-2012-0884", "discovery_date": "2012-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "802725" } ], "notes": [ { "category": "description", "text": "The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: CMS and PKCS#7 Bleichenbacher attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0884" }, { "category": "external", "summary": "RHBZ#802725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0884", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0884" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20120312.txt", "url": "http://www.openssl.org/news/secadv_20120312.txt" } ], "release_date": "2012-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:55:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation and deployed\napplications, and also back up your existing Apache HTTP Server\ninstallation (including all applications and configuration files).\n\nThe Apache HTTP Server, as well as JBoss server instances configured to use\nthe Tomcat Native library, must be restarted for this update to take\neffect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1308" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: CMS and PKCS#7 Bleichenbacher attack" }, { "cve": "CVE-2012-1165", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2012-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "802489" } ], "notes": [ { "category": "description", "text": "The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: mime_param_cmp NULL dereference crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1165" }, { "category": "external", "summary": "RHBZ#802489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1165" } ], "release_date": "2012-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:55:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation and deployed\napplications, and also back up your existing Apache HTTP Server\ninstallation (including all applications and configuration files).\n\nThe Apache HTTP Server, as well as JBoss server instances configured to use\nthe Tomcat Native library, must be restarted for this update to take\neffect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1308" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: mime_param_cmp NULL dereference crash" }, { "cve": "CVE-2012-2110", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-04-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "814185" } ], "notes": [ { "category": "description", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: asn1_d2i_read_bio integer errors leading to buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2110" }, { "category": "external", "summary": "RHBZ#814185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2110", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2110" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2110", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2110" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20120419.txt", "url": "http://www.openssl.org/news/secadv_20120419.txt" } ], "release_date": "2012-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:55:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation and deployed\napplications, and also back up your existing Apache HTTP Server\ninstallation (including all applications and configuration files).\n\nThe Apache HTTP Server, as well as JBoss server instances configured to use\nthe Tomcat Native library, must be restarted for this update to take\neffect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1308" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: asn1_d2i_read_bio integer errors leading to buffer overflow" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Codenomicon" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2012-2333", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2012-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "820686" } ], "notes": [ { "category": "description", "text": "Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: record length handling integer underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3 and 4. The openssl versions in Red Hat Enterprise Linux 5 and 6 were partially affected, as they support DTLS, but they do not support TLS 1.1 and TLS 1.2. This issue was addressed in Red Hat Enterprise Linux 5 and 6 via RHSA-2012:0699.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2333" }, { "category": "external", "summary": "RHBZ#820686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2333", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2333" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2333", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2333" }, { "category": "external", "summary": "http://openssl.org/news/secadv_20120510.txt", "url": "http://openssl.org/news/secadv_20120510.txt" } ], "release_date": "2012-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-24T15:55:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Application Platform installation and deployed\napplications, and also back up your existing Apache HTTP Server\ninstallation (including all applications and configuration files).\n\nThe Apache HTTP Server, as well as JBoss server instances configured to use\nthe Tomcat Native library, must be restarted for this update to take\neffect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1308" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: record length handling integer underflow" } ] }
gsd-2011-4108
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-4108", "description": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "id": "GSD-2011-4108", "references": [ "https://www.suse.com/security/cve/CVE-2011-4108.html", "https://www.debian.org/security/2012/dsa-2390", "https://access.redhat.com/errata/RHSA-2012:1308", "https://access.redhat.com/errata/RHSA-2012:1307", "https://access.redhat.com/errata/RHSA-2012:1306", "https://access.redhat.com/errata/RHSA-2012:0060", "https://access.redhat.com/errata/RHSA-2012:0059", "https://alas.aws.amazon.com/cve/html/CVE-2011-4108.html", "https://linux.oracle.com/cve/CVE-2011-4108.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-4108" ], "details": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "id": "GSD-2011-4108", "modified": "2023-12-13T01:19:05.880119Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/57353", "refsource": "MISC", "url": "http://secunia.com/advisories/57353" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564", "refsource": "MISC", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564" }, { "name": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "name": "http://support.apple.com/kb/HT5784", "refsource": "MISC", "url": "http://support.apple.com/kb/HT5784" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc", "refsource": "MISC", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc" }, { "name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", "refsource": "MISC", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "name": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2" }, { "name": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "name": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1306.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1307.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1308.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html" }, { "name": "http://secunia.com/advisories/48528", "refsource": "MISC", "url": "http://secunia.com/advisories/48528" }, { "name": "http://secunia.com/advisories/57260", "refsource": "MISC", "url": "http://secunia.com/advisories/57260" }, { "name": "http://www.debian.org/security/2012/dsa-2390", "refsource": "MISC", "url": "http://www.debian.org/security/2012/dsa-2390" }, { "name": "http://www.isg.rhul.ac.uk/~kp/dtls.pdf", "refsource": "MISC", "url": "http://www.isg.rhul.ac.uk/~kp/dtls.pdf" }, { "name": "http://www.kb.cert.org/vuls/id/737740", "refsource": "MISC", "url": "http://www.kb.cert.org/vuls/id/737740" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007" }, { "name": "http://www.openssl.org/news/secadv_20120104.txt", "refsource": "MISC", "url": "http://www.openssl.org/news/secadv_20120104.txt" }, { "name": "https://security.paloaltonetworks.com/CVE-2011-4108", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2011-4108" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.8r", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:bogus:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.0e", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4108" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-310" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.isg.rhul.ac.uk/~kp/dtls.pdf", "refsource": "MISC", "tags": [], "url": "http://www.isg.rhul.ac.uk/~kp/dtls.pdf" }, { "name": "http://www.openssl.org/news/secadv_20120104.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.openssl.org/news/secadv_20120104.txt" }, { "name": "MDVSA-2012:006", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006" }, { "name": "MDVSA-2012:007", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007" }, { "name": "SUSE-SU-2012:0084", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" }, { "name": "openSUSE-SU-2012:0083", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" }, { "name": "HPSBMU02786", "refsource": "HP", "tags": [], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc", "refsource": "CONFIRM", "tags": [], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc" }, { "name": "48528", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48528" }, { "name": "HPSBOV02793", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2" }, { "name": "RHSA-2012:1306", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html" }, { "name": "RHSA-2012:1307", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html" }, { "name": "RHSA-2012:1308", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html" }, { "name": "HPSBUX02734", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2" }, { "name": "DSA-2390", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2012/dsa-2390" }, { "name": "APPLE-SA-2013-06-04-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "name": "http://support.apple.com/kb/HT5784", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT5784" }, { "name": "FEDORA-2012-18035", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html" }, { "name": "VU#737740", "refsource": "CERT-VN", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/737740" }, { "name": "SUSE-SU-2014:0320", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564" }, { "name": "57260", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/57260" }, { "name": "57353", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/57353" }, { "name": "SSRT100852", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "name": "https://security.paloaltonetworks.com/CVE-2011-4108", "refsource": "CONFIRM", "tags": [], "url": "https://security.paloaltonetworks.com/CVE-2011-4108" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2016-08-23T02:04Z", "publishedDate": "2012-01-06T01:55Z" } } }
var-201201-0169
Vulnerability from variot
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack. Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL (0.9.8o). OpenSSL prone to multiple security vulnerabilities. An attacker may leverage these issues to obtain sensitive information, cause a denial-of-service condition and perform unauthorized actions. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03360041
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03360041 Version: 1
HPSBMU02786 SSRT100877 rev.1 - HP System Management Homepage (SMH) Running on Linux and Windows, Remote Unauthorized Access, Disclosure of Information, Data Modification, Denial of Service (DoS), Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-06-26 Last Updated: 2012-06-26
Potential Security Impact: Remote unauthorized access, disclosure of information, data modification, Denial of Service (DoS), execution of arbitrary code
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.
References: CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3379, CVE-2011-3607, CVE-2011-4078, CVE-2011-4108, CVE-2011-4153, CVE-2011-4317, CVE-2011-4415, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2011-4885, CVE-2012-0021, CVE-2012-0027, CVE-2012-0031, CVE-2012-0036, CVE-2012-0053, CVE-2012-0057, CVE-2012-0830, CVE-2012-1165, CVE-2012-1823, CVE-2012-2012 (AUTOCOMPLETE enabled), CVE-2012-2013 (DoS), CVE-2012-2014 (Improper input validation), CVE-2012-2015 (Privilege Elevation), CVE-2012-2016 (Information disclosure), SSRT100336, SSRT100753, SSRT100669, SSRT100676, SSRT100695, SSRT100714, SSRT100760, SSRT100786, SSRT100787, SSRT100815, SSRT100840, SSRT100843, SSRT100869
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP System Management Homepage (SMH) before v7.1.1 running on Linux and Windows.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2012-2012 (AV:N/AC:L/Au:N/C:C/I:C/A:P) 9.7 CVE-2012-2013 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2012-2014 (AV:N/AC:M/Au:S/C:N/I:N/A:N) 6.8 CVE-2012-2015 (AV:N/AC:M/Au:S/C:P/I:N/A:N) 6.5 CVE-2012-2016 (AV:L/AC:M/Au:S/C:C/I:N/A:N) 4.4 CVE-2011-1944 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2011-2821 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-2834 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2011-3379 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-3607 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4 CVE-2011-4078 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-4108 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2011-4415 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2 CVE-2011-4576 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2011-4577 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-4619 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-4885 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-0021 (AV:N/AC:H/Au:N/C:N/I:N/A:P) 2.6 CVE-2012-0027 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-0031 (AV:L/AC:L/Au:N/C:P/I:P/A:P) 4.6 CVE-2012-0036 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-0053 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2012-0057 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-1165 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided HP System Management Homepage v7.1.1 or subsequent to resolve the vulnerabilities. HP System Management Homepage v7.1.1 is available here:
HP System Management Homepage for Windows x64
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa meId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab 0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument&javax.p ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign ette.cachetoken
HP System Management Homepage for Windows x86
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa meId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7 c0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument&javax.p ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign ette.cachetoken
HP System Management Homepage for Linux (AMD64/EM64T)
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa meId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18 d373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument&javax.p ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign ette.cachetoken
HP System Management Homepage for Linux (x86)
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa meId%253D4091409%257CswEnvOID%253D4006%257CswLang%253D8%257CswItem%253DMTX-9e 8a0188f97d48139dcb466509%257Cmode%253D3%257Caction%253DdriverDocument&javax.p ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign ette.cachetoken
HISTORY Version:1 (rev.1) 26 June 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201203-12
http://security.gentoo.org/
Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: March 06, 2012 Bugs: #397695, #399365 ID: 201203-12
Synopsis
Multiple vulnerabilities have been found in OpenSSL, allowing remote attackers to cause a Denial of Service or obtain sensitive information.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/openssl < 1.0.0g *>= 0.9.8t >= 1.0.0g
Description
Multiple vulnerabilities have been found in OpenSSL:
- Timing differences for decryption are exposed by CBC mode encryption in OpenSSL's implementation of DTLS (CVE-2011-4108).
- An incorrect fix for CVE-2011-4108 creates an unspecified vulnerability for DTLS applications using OpenSSL (CVE-2012-0050).
Workaround
There is no known workaround at this time.
Resolution
All OpenSSL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.0g"
References
[ 1 ] CVE-2011-4108 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4108 [ 2 ] CVE-2011-4109 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4109 [ 3 ] CVE-2011-4576 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4576 [ 4 ] CVE-2011-4577 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4577 [ 5 ] CVE-2011-4619 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4619 [ 6 ] CVE-2012-0027 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0027 [ 7 ] CVE-2012-0050 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0050
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201203-12.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
Multiple numeric conversion errors, leading to a buffer overflow, were found in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data from BIO (OpenSSL's I/O abstraction) inputs. Specially-crafted DER (Distinguished Encoding Rules) encoded data read from a file or other BIO input could cause an application using the OpenSSL library to crash or, potentially, execute arbitrary code.
Warning: Before applying the update, back up your existing JBoss Enterprise Web Server installation (including all applications and configuration files).
All users of JBoss Enterprise Web Server 1.0.2 for Solaris and Microsoft Windows as provided from the Red Hat Customer Portal are advised to apply this update. Solution:
The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing JBoss Enterprise Web Server installation (including all applications and configuration files). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openssl security update Advisory ID: RHSA-2012:0059-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0059.html Issue date: 2012-01-24 CVE Names: CVE-2011-4108 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 =====================================================================
- Summary:
Updated openssl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.
It was discovered that the Datagram Transport Layer Security (DTLS) protocol implementation in OpenSSL leaked timing information when performing certain operations. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a DTLS server as a padding oracle. (CVE-2011-4108)
An information leak flaw was found in the SSL 3.0 protocol implementation in OpenSSL. Incorrect initialization of SSL record padding bytes could cause an SSL client or server to send a limited amount of possibly sensitive data to its SSL peer via the encrypted connection. (CVE-2011-4576)
A denial of service flaw was found in the RFC 3779 implementation in OpenSSL. A remote attacker could use this flaw to make an application using OpenSSL exit unexpectedly by providing a specially-crafted X.509 certificate that has malformed RFC 3779 extension data. (CVE-2011-4577)
It was discovered that OpenSSL did not limit the number of TLS/SSL handshake restarts required to support Server Gated Cryptography. A remote attacker could use this flaw to make a TLS/SSL server using OpenSSL consume an excessive amount of CPU by continuously restarting the handshake. (CVE-2011-4619)
All OpenSSL users should upgrade to these updated packages, which contain backported patches to resolve these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack 771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding 771778 - CVE-2011-4577 openssl: malformed RFC 3779 data can cause assertion failures 771780 - CVE-2011-4619 openssl: SGC restart DoS attack
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386: openssl-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm
x86_64: openssl-1.0.0-20.el6_2.1.i686.rpm openssl-1.0.0-20.el6_2.1.x86_64.rpm openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386: openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-devel-1.0.0-20.el6_2.1.i686.rpm openssl-perl-1.0.0-20.el6_2.1.i686.rpm openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64: openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm openssl-devel-1.0.0-20.el6_2.1.i686.rpm openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64: openssl-1.0.0-20.el6_2.1.i686.rpm openssl-1.0.0-20.el6_2.1.x86_64.rpm openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
x86_64: openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm openssl-devel-1.0.0-20.el6_2.1.i686.rpm openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386: openssl-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-devel-1.0.0-20.el6_2.1.i686.rpm
ppc64: openssl-1.0.0-20.el6_2.1.ppc.rpm openssl-1.0.0-20.el6_2.1.ppc64.rpm openssl-debuginfo-1.0.0-20.el6_2.1.ppc.rpm openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm openssl-devel-1.0.0-20.el6_2.1.ppc.rpm openssl-devel-1.0.0-20.el6_2.1.ppc64.rpm
s390x: openssl-1.0.0-20.el6_2.1.s390.rpm openssl-1.0.0-20.el6_2.1.s390x.rpm openssl-debuginfo-1.0.0-20.el6_2.1.s390.rpm openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm openssl-devel-1.0.0-20.el6_2.1.s390.rpm openssl-devel-1.0.0-20.el6_2.1.s390x.rpm
x86_64: openssl-1.0.0-20.el6_2.1.i686.rpm openssl-1.0.0-20.el6_2.1.x86_64.rpm openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm openssl-devel-1.0.0-20.el6_2.1.i686.rpm openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386: openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-perl-1.0.0-20.el6_2.1.i686.rpm openssl-static-1.0.0-20.el6_2.1.i686.rpm
ppc64: openssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm openssl-perl-1.0.0-20.el6_2.1.ppc64.rpm openssl-static-1.0.0-20.el6_2.1.ppc64.rpm
s390x: openssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm openssl-perl-1.0.0-20.el6_2.1.s390x.rpm openssl-static-1.0.0-20.el6_2.1.s390x.rpm
x86_64: openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386: openssl-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-devel-1.0.0-20.el6_2.1.i686.rpm
x86_64: openssl-1.0.0-20.el6_2.1.i686.rpm openssl-1.0.0-20.el6_2.1.x86_64.rpm openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm openssl-devel-1.0.0-20.el6_2.1.i686.rpm openssl-devel-1.0.0-20.el6_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm
i386: openssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm openssl-perl-1.0.0-20.el6_2.1.i686.rpm openssl-static-1.0.0-20.el6_2.1.i686.rpm
x86_64: openssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm openssl-static-1.0.0-20.el6_2.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-4108.html https://www.redhat.com/security/data/cve/CVE-2011-4576.html https://www.redhat.com/security/data/cve/CVE-2011-4577.html https://www.redhat.com/security/data/cve/CVE-2011-4619.html https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPHySOXlSAg2UNWIIRAlYpAKCQCY5k4gZ5VKOHZekEaWFHDNjGZwCZAdR3 CJl5iUxU4cxJLOsSBESSRVs= =PMiS -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1357-1 February 09, 2012
openssl vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Multiple vulnerabilities exist in OpenSSL that could expose sensitive information or cause applications to crash.
Software Description: - openssl: Secure Socket Layer (SSL) binary and related cryptographic tools
Details:
It was discovered that the elliptic curve cryptography (ECC) subsystem in OpenSSL, when using the Elliptic Curve Digital Signature Algorithm (ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement curves over binary fields. This could allow an attacker to determine private keys via a timing attack. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945)
Adam Langley discovered that the ephemeral Elliptic Curve Diffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread safety while processing handshake messages from clients. This could allow a remote attacker to cause a denial of service via out-of-order messages that violate the TLS protocol. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. This could allow a remote attacker to recover plaintext. This could allow a remote attacker to cause a denial of service. This could allow a remote attacker to cause a denial of service. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-4109)
It was discovered that OpenSSL, in certain circumstances involving ECDH or ECDHE cipher suites, used an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves. This issue only affected Ubuntu 8.04 LTS. (CVE-2011-4576)
Andrew Chi discovered that OpenSSL, when RFC 3779 support is enabled, could trigger an assert when handling an X.509 certificate containing certificate-extension data associated with IP address blocks or Autonomous System (AS) identifiers. This could allow a remote attacker to cause a denial of service. This could allow a remote attacker to cause a denial of service. (CVE-2011-4619)
Andrey Kulikov discovered that the GOST block cipher engine in OpenSSL did not properly handle invalid parameters. This could allow a remote attacker to cause a denial of service via crafted data from a TLS client. This issue only affected Ubuntu 11.10. (CVE-2012-0027)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.10: libssl1.0.0 1.0.0e-2ubuntu4.2 openssl 1.0.0e-2ubuntu4.2
Ubuntu 11.04: libssl0.9.8 0.9.8o-5ubuntu1.2 openssl 0.9.8o-5ubuntu1.2
Ubuntu 10.10: libssl0.9.8 0.9.8o-1ubuntu4.6 openssl 0.9.8o-1ubuntu4.6
Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.8 openssl 0.9.8k-7ubuntu8.8
Ubuntu 8.04 LTS: libssl0.9.8 0.9.8g-4ubuntu3.15 openssl 0.9.8g-4ubuntu3.15
After a standard system update you need to reboot your computer to make all the necessary changes. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFPFFiBmqjQ0CJFipgRAkIUAJ9foScZELNgGkHUEaaSx9sgdWNMFwCgnsst eph27yO3eEECVX28+SNUKyw= =wTFq -----END PGP SIGNATURE----- . Their attack exploits timing differences arising during decryption processing. A research paper describing this attack can be found at http://www.isg.rhul.ac.uk/~kp/dtls.pdf
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information Security Group at Royal Holloway, University of London (www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann seggelmann@fh-muenster.de and Michael Tuexen tuexen@fh-muenster.de for preparing the fix.
Double-free in Policy Checks (CVE-2011-4109)
If X509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy check failure can lead to a double-free. The bug does not occur unless this flag is set. Users of OpenSSL 1.0.0 are not affected.
This flaw was discovered by Ben Laurie and a fix provided by Emilia Kasper ekasper@google.com of Google. This affects both clients and servers that accept SSL 3.0 handshakes: those that call SSL_CTX_new with SSLv3_{server|client}method or SSLv23{server|client}_method. It does not affect TLS. This could include sensitive contents of previously freed memory.
However, in practice, most deployments do not use SSL_MODE_RELEASE_BUFFERS and therefore have a single write buffer per connection. That write buffer is partially filled with non-sensitive, handshake data at the beginning of the connection and, thereafter, only records which are longer any any previously sent record leak any non-encrypted data. This, combined with the small number of bytes leaked per record, serves to limit to severity of this issue.
Thanks to Adam Langley agl@chromium.org for identifying and fixing this issue.
Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577)
RFC 3779 data can be included in certificates, and if it is malformed, may trigger an assertion failure. This could be used in a denial-of-service attack.
Note, however, that in the standard release of OpenSSL, RFC 3779 support is disabled by default, and in this case OpenSSL is not vulnerable. Builds of OpenSSL are vulnerable if configured with "enable-rfc3779".
Thanks to Andrew Chi, BBN Technologies, for discovering the flaw, and Rob Austein sra@hactrn.net for fixing it.
Thanks to George Kadianakis desnacked@gmail.com for identifying this issue and to Adam Langley agl@chromium.org for fixing it.
Invalid GOST parameters DoS Attack (CVE-2012-0027)
A malicious TLS client can send an invalid set of GOST parameters which will cause the server to crash due to lack of error checking. This could be used in a denial-of-service attack.
Only users of the OpenSSL GOST ENGINE are affected by this bug.
Thanks to Andrey Kulikov amdeich@gmail.com for identifying and fixing this issue.
References
URL for this Security Advisory: https://www.openssl.org/news/secadv_20120104.txt
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201201-0169", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.8d" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.8c" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7m" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.8h" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.8e" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.7l" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.8f" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.8b" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.8" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "0.9.8a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.4" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7f" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.8r" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8o" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8q" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8p" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6f" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "1.0.0e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.5a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8n" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.7c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.8i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "0.9.6b" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "efi", "version": null }, { "model": "project openssl 0.9.8m", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "project openssl 0.9.8n", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "project openssl 0.9.8o", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "informix genero", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.32" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "big-ip wom hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.2" }, { "model": "aura system platform", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "hardware management console 7r7.7.0", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "project openssl 0.9.8f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux enterprise sdk sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "project openssl 1.0.0d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip apm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "informix genero", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.41" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.1" }, { "model": "big-ip webaccelerator hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.1" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.1" }, { "model": "aura system manager", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "hardware management console 7r7.2.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "hardware management console 7r7.1.0 sp4", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "8.1-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "junos space ja1500 appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "proactive contact", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.8" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "service delivery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1" }, { "model": "voice portal", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.1.3" }, { "model": "big-ip psm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "junos space ja2500 appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "xiv storage system gen3 mtm", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2812-11411.2" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "reflection sp1", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "aura communication manager sp4", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.1" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0.0.52" }, { "model": "tivoli netcool/system service monitor fp11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "big-ip webaccelerator hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "8.2-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "xiv storage system gen3 mtm 11.1.0.a", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2810-114" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "tivoli netcool/system service monitor fp12", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.0" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.44" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "hardware management console 7r7.1.0 sp3", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.40" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.4" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "project openssl 0.9.8r", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "junos space 14.1r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "8.3-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "tivoli network manager fp7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "pfsense", "scope": "ne", "trust": 0.3, "vendor": "bsdperimeter", "version": "2.0.2" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.3" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.1" }, { "model": "big-ip ltm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "tivoli netcool/system service monitor fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "junos space 13.1p1.14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.2" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.2" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "project openssl 0.9.8p", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "reflection for ibm", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "20070" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "hardware management console 7r7.3.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.3" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "cloudburst", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "messaging storage server", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.2.14" }, { "model": "project openssl 0.9.8s", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "linux enterprise server sp3 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.01" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "cloudburst", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "project openssl 0.9.8q", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-453" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "project openssl 1.0.0f", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.50" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "tivoli netcool/system service monitor fp10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.55" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.0" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56001" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "big-ip psm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip apm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip psm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.00" }, { "model": "infosphere balanced warehouse c4000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "big-ip wom hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "service delivery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.4" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.1" }, { "model": "project openssl 0.9.8g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "jboss enterprise application platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.1.2" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "big-ip webaccelerator hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "tivoli workload scheduler for applications fp02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "xiv storage system gen3 mtm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2812-11411.1.1" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4" }, { "model": "meeting exchange", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "jboss enterprise web server for solaris", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "1.0.2" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "xiv storage system gen3 mtm", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2810-11411.2" }, { "model": "big-ip wom hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "tivoli netcool/system service monitor fp13", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tivoli remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "big-ip edge gateway hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux enterprise server for vmware sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "infosphere balanced warehouse d5100", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "big-ip psm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "tivoli netcool/system service monitor fp6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "big-ip webaccelerator hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "cloudburst", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "hardware management console 7r7.2.0 sp2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.7" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "project openssl 0.9.8l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "big-ip wom hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "messaging storage server sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "big-ip analytics 11.0.0-hf2", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.2" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "jboss enterprise application platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.0" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "onboard administrator", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.56" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.12" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "tivoli workload scheduler for applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "big-ip psm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "project openssl 1.0.0e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "ssl for openvms", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.4-467" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.1" }, { "model": "infosphere balanced warehouse c3000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4" }, { "model": "big-ip apm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "xiv storage system gen3 mtm 11.0.1.a", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2810-114" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "fiery print controller", "scope": "eq", "trust": 0.3, "vendor": "efi", "version": "2.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "docucolor dc260", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "0" }, { "model": "tivoli netcool/system service monitor fp8", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "service delivery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "docucolor dc242", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "0" }, { "model": "project openssl 1.0.0c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip apm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "tivoli workload scheduler distributed fp03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "20500" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.13" }, { "model": "aura sip enablement services sp4", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "big-ip wom hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "reflection for ibm", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "20080" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "aura communication manager utility services", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2.5.0.15" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.1" }, { "model": "7.4-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.9" }, { "model": "tivoli netcool/system service monitor fp4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "project openssl 1.0.0b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "57100" }, { "model": "big-ip webaccelerator hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "pfsense", "scope": "eq", "trust": 0.3, "vendor": "bsdperimeter", "version": "2.0" }, { "model": "tivoli netcool/system service monitor fp9", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "tivoli workload scheduler distributed fp07", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.3" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "sterling connect:direct", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "tivoli netcool/system service monitor fp5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.8.4" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "tivoli workload scheduler for applications fp01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "big-ip psm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "tivoli workload scheduler distributed fp02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "big-ip apm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "xiv storage system gen3 mtm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2810-11411.1.1" }, { "model": "reflection sp1", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.1" }, { "model": "big-ip psm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "aura application server sip core pb26", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "sterling connect:direct", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "big-ip webaccelerator hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "xiv storage system gen3 mtm 11.1.0.a", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2812-114" }, { "model": "9.0-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "xiv storage system gen3 mtm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2810-11411" }, { "model": "sterling connect:direct", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.61" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "enterprise virtualization hypervisor for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "60" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "linux enterprise sdk sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "big-ip apm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56002" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "76000" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "aura experience portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "tivoli netcool/system service monitor fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1" }, { "model": "junos space r1.8", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "informix genero", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.40" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0.00" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3" }, { "model": "reflection for unix and openvms", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "20080" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.0" }, { "model": "enterprise virtualization hypervisor for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "50" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "big-ip psm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "tivoli netcool/system service monitor fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "tivoli network manager fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9" }, { "model": "jboss enterprise web server for windows", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "1.0.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "tivoli netcool/system service monitor fp7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "9.0-release", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip wom hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "7.4" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77100" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "hardware management console 7r7.1.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "xiv storage system gen3 mtm 11.0.1.a", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2812-114" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10500" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "big-ip analytics hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77000" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16.3" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "14.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.2" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.00" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "big-ip psm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "tivoli workload scheduler distributed fp04", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "docucolor dc252", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.1" }, { "model": "aura application enablement services", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "tivoli netcool/omnibus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "ds8870", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "linux enterprise desktop sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "big-ip pem hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "hardware management console 7r7.2.0 sp1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "pfsense", "scope": "eq", "trust": 0.3, "vendor": "bsdperimeter", "version": "2.0.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "message networking", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.2.5" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.1" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "big-ip psm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "project openssl 1.0.0a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "xiv storage system gen3 mtm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2812-11411" } ], "sources": [ { "db": "CERT/CC", "id": "VU#737740" }, { "db": "BID", "id": "51281" }, { "db": "CNNVD", "id": "CNNVD-201201-057" }, { "db": "NVD", "id": "CVE-2011-4108" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.8r", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:bogus:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.0e", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2011-4108" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nadhem Alfardan and Kenny Paterson, Information Security Group at Royal Holloway, University of London, Ben Laurie, Adam Langley, Andrew Chi, BBN Technologies and Andrey Kulikov", "sources": [ { "db": "BID", "id": "51281" } ], "trust": 0.3 }, "cve": "CVE-2011-4108", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-4108", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2011-4108", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201201-057", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2011-4108", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-4108" }, { "db": "CNNVD", "id": "CNNVD-201201-057" }, { "db": "NVD", "id": "CVE-2011-4108" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack. Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL (0.9.8o). OpenSSL prone to multiple security vulnerabilities. \nAn attacker may leverage these issues to obtain sensitive information, cause a denial-of-service condition and perform unauthorized actions. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03360041\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03360041\nVersion: 1\n\nHPSBMU02786 SSRT100877 rev.1 - HP System Management Homepage (SMH) Running on\nLinux and Windows, Remote Unauthorized Access, Disclosure of Information,\nData Modification, Denial of Service (DoS), Execution of Arbitrary Code\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2012-06-26\nLast Updated: 2012-06-26\n\nPotential Security Impact: Remote unauthorized access, disclosure of\ninformation, data modification, Denial of Service (DoS), execution of\narbitrary code\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System\nManagement Homepage (SMH) running on Linux and Windows. The vulnerabilities\ncould be exploited remotely resulting in unauthorized access, disclosure of\ninformation, data modification, Denial of Service (DoS), and execution of\narbitrary code. \n\nReferences: CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3379,\nCVE-2011-3607, CVE-2011-4078, CVE-2011-4108, CVE-2011-4153, CVE-2011-4317,\nCVE-2011-4415, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2011-4885,\nCVE-2012-0021, CVE-2012-0027, CVE-2012-0031, CVE-2012-0036, CVE-2012-0053,\nCVE-2012-0057, CVE-2012-0830, CVE-2012-1165, CVE-2012-1823,\nCVE-2012-2012 (AUTOCOMPLETE enabled), CVE-2012-2013 (DoS),\nCVE-2012-2014 (Improper input validation), CVE-2012-2015 (Privilege\nElevation),\nCVE-2012-2016 (Information disclosure),\nSSRT100336, SSRT100753, SSRT100669, SSRT100676,\nSSRT100695, SSRT100714, SSRT100760, SSRT100786,\nSSRT100787, SSRT100815, SSRT100840, SSRT100843, SSRT100869\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP System Management Homepage (SMH) before v7.1.1 running on Linux and\nWindows. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2012-2012 (AV:N/AC:L/Au:N/C:C/I:C/A:P) 9.7\nCVE-2012-2013 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2012-2014 (AV:N/AC:M/Au:S/C:N/I:N/A:N) 6.8\nCVE-2012-2015 (AV:N/AC:M/Au:S/C:P/I:N/A:N) 6.5\nCVE-2012-2016 (AV:L/AC:M/Au:S/C:C/I:N/A:N) 4.4\nCVE-2011-1944 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2011-2821 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-2834 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2011-3379 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-3607 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4\nCVE-2011-4078 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-4108 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2011-4415 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2\nCVE-2011-4576 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2011-4577 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-4619 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-4885 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-0021 (AV:N/AC:H/Au:N/C:N/I:N/A:P) 2.6\nCVE-2012-0027 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-0031 (AV:L/AC:L/Au:N/C:P/I:P/A:P) 4.6\nCVE-2012-0036 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-0053 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2012-0057 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4\nCVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-1165 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided HP System Management Homepage v7.1.1 or subsequent to resolve\nthe vulnerabilities. HP System Management Homepage v7.1.1 is available here:\n\nHP System Management Homepage for Windows x64\n\n[Download here] or enter the following URL into the browser address window. \n\nhttp://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail\ns/?sp4ts.oid=4091409\u0026spf_p.tpst=psiSwdMain\u0026spf_p.prp_psiSwdMain=wsrp-navigati\nonalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa\nmeId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab\n0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument\u0026javax.p\nortlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vign\nette.cachetoken\n\nHP System Management Homepage for Windows x86\n\n[Download here] or enter the following URL into the browser address window. \n\nhttp://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail\ns/?sp4ts.oid=4091409\u0026spf_p.tpst=psiSwdMain\u0026spf_p.prp_psiSwdMain=wsrp-navigati\nonalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa\nmeId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7\nc0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument\u0026javax.p\nortlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vign\nette.cachetoken\n\nHP System Management Homepage for Linux (AMD64/EM64T)\n\n[Download here] or enter the following URL into the browser address window. \n\nhttp://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail\ns/?sp4ts.oid=4091409\u0026spf_p.tpst=psiSwdMain\u0026spf_p.prp_psiSwdMain=wsrp-navigati\nonalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa\nmeId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18\nd373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument\u0026javax.p\nortlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vign\nette.cachetoken\n\nHP System Management Homepage for Linux (x86)\n\n[Download here] or enter the following URL into the browser address window. \n\nhttp://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail\ns/?sp4ts.oid=4091409\u0026spf_p.tpst=psiSwdMain\u0026spf_p.prp_psiSwdMain=wsrp-navigati\nonalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa\nmeId%253D4091409%257CswEnvOID%253D4006%257CswLang%253D8%257CswItem%253DMTX-9e\n8a0188f97d48139dcb466509%257Cmode%253D3%257Caction%253DdriverDocument\u0026javax.p\nortlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vign\nette.cachetoken\n\nHISTORY\nVersion:1 (rev.1) 26 June 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201203-12\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: OpenSSL: Multiple vulnerabilities\n Date: March 06, 2012\n Bugs: #397695, #399365\n ID: 201203-12\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL, allowing remote\nattackers to cause a Denial of Service or obtain sensitive information. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-libs/openssl \u003c 1.0.0g *\u003e= 0.9.8t\n \u003e= 1.0.0g\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in OpenSSL:\n\n* Timing differences for decryption are exposed by CBC mode encryption\n in OpenSSL\u0027s implementation of DTLS (CVE-2011-4108). \n* An incorrect fix for CVE-2011-4108 creates an unspecified\n vulnerability for DTLS applications using OpenSSL (CVE-2012-0050). \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll OpenSSL users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/openssl-1.0.0g\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-4108\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4108\n[ 2 ] CVE-2011-4109\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4109\n[ 3 ] CVE-2011-4576\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4576\n[ 4 ] CVE-2011-4577\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4577\n[ 5 ] CVE-2011-4619\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4619\n[ 6 ] CVE-2012-0027\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0027\n[ 7 ] CVE-2012-0050\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0050\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201203-12.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nMultiple numeric conversion errors, leading to a buffer overflow, were\nfound in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data\nfrom BIO (OpenSSL\u0027s I/O abstraction) inputs. Specially-crafted DER\n(Distinguished Encoding Rules) encoded data read from a file or other BIO\ninput could cause an application using the OpenSSL library to crash or,\npotentially, execute arbitrary code. \n\nWarning: Before applying the update, back up your existing JBoss Enterprise\nWeb Server installation (including all applications and configuration\nfiles). \n\nAll users of JBoss Enterprise Web Server 1.0.2 for Solaris and Microsoft\nWindows as provided from the Red Hat Customer Portal are advised to apply\nthis update. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: openssl security update\nAdvisory ID: RHSA-2012:0059-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2012-0059.html\nIssue date: 2012-01-24\nCVE Names: CVE-2011-4108 CVE-2011-4576 CVE-2011-4577 \n CVE-2011-4619 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library. \n\nIt was discovered that the Datagram Transport Layer Security (DTLS)\nprotocol implementation in OpenSSL leaked timing information when\nperforming certain operations. A remote attacker could possibly use this\nflaw to retrieve plain text from the encrypted packets by using a DTLS\nserver as a padding oracle. (CVE-2011-4108)\n\nAn information leak flaw was found in the SSL 3.0 protocol implementation\nin OpenSSL. Incorrect initialization of SSL record padding bytes could\ncause an SSL client or server to send a limited amount of possibly\nsensitive data to its SSL peer via the encrypted connection. \n(CVE-2011-4576)\n\nA denial of service flaw was found in the RFC 3779 implementation in\nOpenSSL. A remote attacker could use this flaw to make an application using\nOpenSSL exit unexpectedly by providing a specially-crafted X.509\ncertificate that has malformed RFC 3779 extension data. (CVE-2011-4577)\n\nIt was discovered that OpenSSL did not limit the number of TLS/SSL\nhandshake restarts required to support Server Gated Cryptography. A remote\nattacker could use this flaw to make a TLS/SSL server using OpenSSL consume\nan excessive amount of CPU by continuously restarting the handshake. \n(CVE-2011-4619)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack\n771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding\n771778 - CVE-2011-4577 openssl: malformed RFC 3779 data can cause assertion failures\n771780 - CVE-2011-4619 openssl: SGC restart DoS attack\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm\n\ni386:\nopenssl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\n\nx86_64:\nopenssl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-devel-1.0.0-20.el6_2.1.i686.rpm\nopenssl-perl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-static-1.0.0-20.el6_2.1.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-devel-1.0.0-20.el6_2.1.i686.rpm\nopenssl-devel-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-perl-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-static-1.0.0-20.el6_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm\n\nx86_64:\nopenssl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-devel-1.0.0-20.el6_2.1.i686.rpm\nopenssl-devel-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-perl-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-static-1.0.0-20.el6_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm\n\ni386:\nopenssl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-devel-1.0.0-20.el6_2.1.i686.rpm\n\nppc64:\nopenssl-1.0.0-20.el6_2.1.ppc.rpm\nopenssl-1.0.0-20.el6_2.1.ppc64.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.ppc.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm\nopenssl-devel-1.0.0-20.el6_2.1.ppc.rpm\nopenssl-devel-1.0.0-20.el6_2.1.ppc64.rpm\n\ns390x:\nopenssl-1.0.0-20.el6_2.1.s390.rpm\nopenssl-1.0.0-20.el6_2.1.s390x.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.s390.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm\nopenssl-devel-1.0.0-20.el6_2.1.s390.rpm\nopenssl-devel-1.0.0-20.el6_2.1.s390x.rpm\n\nx86_64:\nopenssl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-devel-1.0.0-20.el6_2.1.i686.rpm\nopenssl-devel-1.0.0-20.el6_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-perl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-static-1.0.0-20.el6_2.1.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.0-20.el6_2.1.ppc64.rpm\nopenssl-perl-1.0.0-20.el6_2.1.ppc64.rpm\nopenssl-static-1.0.0-20.el6_2.1.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.0-20.el6_2.1.s390x.rpm\nopenssl-perl-1.0.0-20.el6_2.1.s390x.rpm\nopenssl-static-1.0.0-20.el6_2.1.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-perl-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-static-1.0.0-20.el6_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm\n\ni386:\nopenssl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-devel-1.0.0-20.el6_2.1.i686.rpm\n\nx86_64:\nopenssl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-devel-1.0.0-20.el6_2.1.i686.rpm\nopenssl-devel-1.0.0-20.el6_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-20.el6_2.1.src.rpm\n\ni386:\nopenssl-debuginfo-1.0.0-20.el6_2.1.i686.rpm\nopenssl-perl-1.0.0-20.el6_2.1.i686.rpm\nopenssl-static-1.0.0-20.el6_2.1.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-perl-1.0.0-20.el6_2.1.x86_64.rpm\nopenssl-static-1.0.0-20.el6_2.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-4108.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-4576.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-4577.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-4619.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFPHySOXlSAg2UNWIIRAlYpAKCQCY5k4gZ5VKOHZekEaWFHDNjGZwCZAdR3\nCJl5iUxU4cxJLOsSBESSRVs=\n=PMiS\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Content-Disposition: inline\n\n==========================================================================Ubuntu Security Notice USN-1357-1\nFebruary 09, 2012\n\nopenssl vulnerabilities\n==========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.10\n- Ubuntu 10.04 LTS\n- Ubuntu 8.04 LTS\n\nSummary:\n\nMultiple vulnerabilities exist in OpenSSL that could expose\nsensitive information or cause applications to crash. \n\nSoftware Description:\n- openssl: Secure Socket Layer (SSL) binary and related cryptographic tools\n\nDetails:\n\nIt was discovered that the elliptic curve cryptography (ECC) subsystem\nin OpenSSL, when using the Elliptic Curve Digital Signature Algorithm\n(ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement\ncurves over binary fields. This could allow an attacker to determine\nprivate keys via a timing attack. This issue only affected Ubuntu 8.04\nLTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945)\n\nAdam Langley discovered that the ephemeral Elliptic Curve\nDiffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread\nsafety while processing handshake messages from clients. This\ncould allow a remote attacker to cause a denial of service via\nout-of-order messages that violate the TLS protocol. This issue only\naffected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu\n11.04. This could allow a remote\nattacker to recover plaintext. This could allow a remote\nattacker to cause a denial of service. This\ncould allow a remote attacker to cause a denial of service. This\nissue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10\nand Ubuntu 11.04. (CVE-2011-4109)\n\nIt was discovered that OpenSSL, in certain circumstances involving\nECDH or ECDHE cipher suites, used an incorrect modular reduction\nalgorithm in its implementation of the P-256 and P-384 NIST elliptic\ncurves. This issue only\naffected Ubuntu 8.04 LTS. (CVE-2011-4576)\n\nAndrew Chi discovered that OpenSSL, when RFC 3779 support is enabled,\ncould trigger an assert when handling an X.509 certificate containing\ncertificate-extension data associated with IP address blocks or\nAutonomous System (AS) identifiers. This could allow a remote attacker\nto cause a denial of service. This could allow a remote attacker to cause a denial of\nservice. (CVE-2011-4619)\n\nAndrey Kulikov discovered that the GOST block cipher engine in OpenSSL\ndid not properly handle invalid parameters. This could allow a remote\nattacker to cause a denial of service via crafted data from a TLS\nclient. This issue only affected Ubuntu 11.10. (CVE-2012-0027)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 11.10:\n libssl1.0.0 1.0.0e-2ubuntu4.2\n openssl 1.0.0e-2ubuntu4.2\n\nUbuntu 11.04:\n libssl0.9.8 0.9.8o-5ubuntu1.2\n openssl 0.9.8o-5ubuntu1.2\n\nUbuntu 10.10:\n libssl0.9.8 0.9.8o-1ubuntu4.6\n openssl 0.9.8o-1ubuntu4.6\n\nUbuntu 10.04 LTS:\n libssl0.9.8 0.9.8k-7ubuntu8.8\n openssl 0.9.8k-7ubuntu8.8\n\nUbuntu 8.04 LTS:\n libssl0.9.8 0.9.8g-4ubuntu3.15\n openssl 0.9.8g-4ubuntu3.15\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFPFFiBmqjQ0CJFipgRAkIUAJ9foScZELNgGkHUEaaSx9sgdWNMFwCgnsst\neph27yO3eEECVX28+SNUKyw=\n=wTFq\n-----END PGP SIGNATURE-----\n. Their attack exploits timing differences arising during\ndecryption processing. A research paper describing this attack can be\nfound at http://www.isg.rhul.ac.uk/~kp/dtls.pdf\n\nThanks go to Nadhem Alfardan and Kenny Paterson of the Information\nSecurity Group at Royal Holloway, University of London\n(www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann\n\u003cseggelmann@fh-muenster.de\u003e and Michael Tuexen \u003ctuexen@fh-muenster.de\u003e\nfor preparing the fix. \n\nDouble-free in Policy Checks (CVE-2011-4109)\n============================================\n\nIf X509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy\ncheck failure can lead to a double-free. The bug does not occur \nunless this flag is set. Users of OpenSSL 1.0.0 are not affected. \n\nThis flaw was discovered by Ben Laurie and a fix provided by Emilia\nKasper \u003cekasper@google.com\u003e of Google. This affects both clients and\nservers that accept SSL 3.0 handshakes: those that call SSL_CTX_new with\nSSLv3_{server|client}_method or SSLv23_{server|client}_method. It does\nnot affect TLS. This could include sensitive\ncontents of previously freed memory. \n\nHowever, in practice, most deployments do not use\nSSL_MODE_RELEASE_BUFFERS and therefore have a single write buffer per\nconnection. That write buffer is partially filled with non-sensitive,\nhandshake data at the beginning of the connection and, thereafter,\nonly records which are longer any any previously sent record leak any\nnon-encrypted data. This, combined with the small number of bytes\nleaked per record, serves to limit to severity of this issue. \n\nThanks to Adam Langley \u003cagl@chromium.org\u003e for identifying and fixing\nthis issue. \n\nMalformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577)\n====================================================================\n\nRFC 3779 data can be included in certificates, and if it is malformed,\nmay trigger an assertion failure. This could be used in a\ndenial-of-service attack. \n\nNote, however, that in the standard release of OpenSSL, RFC 3779\nsupport is disabled by default, and in this case OpenSSL is not\nvulnerable. Builds of OpenSSL are vulnerable if configured with \n\"enable-rfc3779\". \n\nThanks to Andrew Chi, BBN Technologies, for discovering the flaw, and\nRob Austein \u003csra@hactrn.net\u003e for fixing it. \n\nThanks to George Kadianakis \u003cdesnacked@gmail.com\u003e for identifying\nthis issue and to Adam Langley \u003cagl@chromium.org\u003e for fixing it. \n\nInvalid GOST parameters DoS Attack (CVE-2012-0027)\n===================================================\n\nA malicious TLS client can send an invalid set of GOST parameters\nwhich will cause the server to crash due to lack of error checking. \nThis could be used in a denial-of-service attack. \n\nOnly users of the OpenSSL GOST ENGINE are affected by this bug. \n\nThanks to Andrey Kulikov \u003camdeich@gmail.com\u003e for identifying and fixing\nthis issue. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20120104.txt\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-4108" }, { "db": "CERT/CC", "id": "VU#737740" }, { "db": "BID", "id": "51281" }, { "db": "VULMON", "id": "CVE-2011-4108" }, { "db": "PACKETSTORM", "id": "116826" }, { "db": "PACKETSTORM", "id": "114272" }, { "db": "PACKETSTORM", "id": "110482" }, { "db": "PACKETSTORM", "id": "116825" }, { "db": "PACKETSTORM", "id": "109053" }, { "db": "PACKETSTORM", "id": "109614" }, { "db": "PACKETSTORM", "id": "108735" }, { "db": "PACKETSTORM", "id": "169679" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4108", "trust": 2.9 }, { "db": "CERT/CC", "id": "VU#737740", "trust": 2.2 }, { "db": "SECUNIA", "id": "57260", "trust": 1.1 }, { "db": "SECUNIA", "id": "48528", "trust": 1.1 }, { "db": "SECUNIA", "id": "57353", "trust": 1.1 }, { "db": "AUSCERT", "id": "ESB-2022.0696", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-24443", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201201-057", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10659", "trust": 0.3 }, { "db": "BID", "id": "51281", "trust": 0.3 }, { "db": "VULMON", "id": "CVE-2011-4108", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116124", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116826", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "114272", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110482", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116825", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109053", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109614", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108735", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169679", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#737740" }, { "db": "VULMON", "id": "CVE-2011-4108" }, { "db": "BID", "id": "51281" }, { "db": "PACKETSTORM", "id": "116124" }, { "db": "PACKETSTORM", "id": "116826" }, { "db": "PACKETSTORM", "id": "114272" }, { "db": "PACKETSTORM", "id": "110482" }, { "db": "PACKETSTORM", "id": "116825" }, { "db": "PACKETSTORM", "id": "109053" }, { "db": "PACKETSTORM", "id": "109614" }, { "db": "PACKETSTORM", "id": "108735" }, { "db": "PACKETSTORM", "id": "169679" }, { "db": "CNNVD", "id": "CNNVD-201201-057" }, { "db": "NVD", "id": "CVE-2011-4108" } ] }, "id": "VAR-201201-0169", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4440100783333334 }, "last_update_date": "2024-06-17T11:44:02.037000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "openssl-1.0.0f", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42348" }, { "title": "openssl-0.9.8s", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42347" }, { "title": "Red Hat: Moderate: openssl security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120059 - security advisory" }, { "title": "Red Hat: Moderate: openssl security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120060 - security advisory" }, { "title": "Debian CVElist Bug Report Logs: CVE-2011-4354: OpenSSL 0.9.8g (32-bit builds) bug leaks ECC private keys", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=ea25fd33228ddfe870d0eb9177265369" }, { "title": "Debian Security Advisories: DSA-2390-1 openssl -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=e583d2cd94d02b09eb008edba3c25e28" }, { "title": "Debian CVElist Bug Report Logs: Potential DTLS crasher bug", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=42b9da1ce27bbcacbdb9142890b6ad6b" }, { "title": "Amazon Linux AMI: ALAS-2012-038", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2012-038" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1357-1" }, { "title": "", "trust": 0.1, "url": "https://github.com/hrbrmstr/internetdb " } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-4108" }, { "db": "CNNVD", "id": "CNNVD-201201-057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2011-4108" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://www.openssl.org/news/secadv_20120104.txt" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2012-1306.html" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2012-1308.html" }, { "trust": 1.5, "url": "http://www.kb.cert.org/vuls/id/737740" }, { "trust": 1.4, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041" }, { "trust": 1.4, "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc" }, { "trust": 1.4, "url": "http://rhn.redhat.com/errata/rhsa-2012-1307.html" }, { "trust": 1.4, "url": "http://support.apple.com/kb/ht5784" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004564" }, { "trust": 1.2, "url": "http://www.isg.rhul.ac.uk/~kp/dtls.pdf" }, { "trust": 1.1, "url": "http://w3.efi.com/fiery" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:006" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:007" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48528" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2" }, { "trust": 1.1, "url": "http://www.debian.org/security/2012/dsa-2390" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2013/jun/msg00000.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-november/092905.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/57260" }, { "trust": 1.1, "url": "http://secunia.com/advisories/57353" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "trust": 1.1, "url": "https://security.paloaltonetworks.com/cve-2011-4108" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4108" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4576" }, { "trust": 0.8, "url": "http://www.support.xerox.com/support/docucolor-242-252-260/downloads/enus.html?associatedproduct=fiery-exp260\u0026operatingsystem=win7x64" }, { "trust": 0.8, "url": "https://www.openssl.org/news/vulnerabilities.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4619" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4109" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4577" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0696" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/solutions/len-24443" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0027" }, { "trust": 0.3, "url": "http://www.attachmate.com/" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=isg400001530" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=isg400001529" }, { "trust": 0.3, "url": "https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_potential_security_exposure_when_using_ibm_infosphere_streams_due_to_vulnerabilities_in_ibm_java_se_version_6_sdk6?lang=en_us" }, { "trust": 0.3, "url": "https://www14.software.ibm.com/webapp/iwm/web/prelogin.do?source=aixbp" }, { "trust": 0.3, "url": "http://www.openssl.org" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100157565" }, { "trust": 0.3, "url": "http://blog.pfsense.org/?p=676" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21637929" }, { "trust": 0.3, "url": "https://www.ibm.com/connections/blogs/psirt/entry/security_bulletin_ibm_tivoli_netcool_system_service_monitors_application_service_monitors_is_affected_by_multiple_openssl_vulnerabilities?lang=en_us" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/1708.html" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/2502.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21631429" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21626257" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21651196" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10659" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100156631" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100156392" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100157969" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100161892" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100161590" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21650623" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643698" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas12088ececb530423186257b410072035e" }, { "trust": 0.3, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03315912" }, { "trust": 0.3, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03383940" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21638022" }, { "trust": 0.3, "url": "https://www.ibm.com/support/docview.wss?uid=swg21619837" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21631322" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001560" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24030251" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24033501" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004323" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643442" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21625170" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21651176" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21627934" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21633107" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21635888" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21638669" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21638670" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643439" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643437" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15314.html" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15388.html?ref=rss" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15389.html?ref=rss" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15395.html?ref=rss" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15460.html?ref=rss" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15461.html?ref=rss" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643316" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2012-0013.html" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100158312" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100150578" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100156392" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1165" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-4619.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-4108.html" }, { "trust": 0.3, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-4576.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2333" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-4109.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-2333.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-2110.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0884" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-0884.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2110" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-1165.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0050" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/310.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2012:0059" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/1357-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4410" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1020" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4325" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3209" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0830" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4110" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4128" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3363" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-5029" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1833" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2496" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2761" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3188" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-5064" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4180" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0014" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1089" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2699" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4252" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4609" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3597" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4132" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4324" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2484" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform\u0026downloadtype=securitypatches\u0026version=6.0.0" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0036" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0057" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4078" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0031" }, { "trust": 0.1, "url": "http://h20566.www2.hp.com/portal/site/hpsc/template.page/public/psi/swddetail" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4885" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2834" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4317" }, { "trust": 0.1, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1944" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2014" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0830" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4153" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1823" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2013" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4415" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3607" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0021" }, { "trust": 0.1, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0053" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2012" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3379" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2821" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4577" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4576" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0027" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4619" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0050" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201203-12.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4109" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4108" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver\u0026downloadtype=securitypatches\u0026version=1.0.2" }, { "trust": 0.1, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-4577.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-0059.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/0.9.8g-4ubuntu3.15" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3210" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1357-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1945" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/0.9.8o-1ubuntu4.6" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4354" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/0.9.8o-5ubuntu1.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.0e-2ubuntu4.2" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0027" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4108" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4576" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4619" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4109" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "https://www.isg.rhul.ac.uk)" } ], "sources": [ { "db": "CERT/CC", "id": "VU#737740" }, { "db": "VULMON", "id": "CVE-2011-4108" }, { "db": "BID", "id": "51281" }, { "db": "PACKETSTORM", "id": "116124" }, { "db": "PACKETSTORM", "id": "116826" }, { "db": "PACKETSTORM", "id": "114272" }, { "db": "PACKETSTORM", "id": "110482" }, { "db": "PACKETSTORM", "id": "116825" }, { "db": "PACKETSTORM", "id": "109053" }, { "db": "PACKETSTORM", "id": "109614" }, { "db": "PACKETSTORM", "id": "108735" }, { "db": "PACKETSTORM", "id": "169679" }, { "db": "CNNVD", "id": "CNNVD-201201-057" }, { "db": "NVD", "id": "CVE-2011-4108" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#737740" }, { "db": "VULMON", "id": "CVE-2011-4108" }, { "db": "BID", "id": "51281" }, { "db": "PACKETSTORM", "id": "116124" }, { "db": "PACKETSTORM", "id": "116826" }, { "db": "PACKETSTORM", "id": "114272" }, { "db": "PACKETSTORM", "id": "110482" }, { "db": "PACKETSTORM", "id": "116825" }, { "db": "PACKETSTORM", "id": "109053" }, { "db": "PACKETSTORM", "id": "109614" }, { "db": "PACKETSTORM", "id": "108735" }, { "db": "PACKETSTORM", "id": "169679" }, { "db": "CNNVD", "id": "CNNVD-201201-057" }, { "db": "NVD", "id": "CVE-2011-4108" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-03-18T00:00:00", "db": "CERT/CC", "id": "VU#737740" }, { "date": "2012-01-06T00:00:00", "db": "VULMON", "id": "CVE-2011-4108" }, { "date": "2012-01-05T00:00:00", "db": "BID", "id": "51281" }, { "date": "2012-09-01T00:00:25", "db": "PACKETSTORM", "id": "116124" }, { "date": "2012-09-25T00:15:41", "db": "PACKETSTORM", "id": "116826" }, { "date": "2012-06-28T03:39:12", "db": "PACKETSTORM", "id": "114272" }, { "date": "2012-03-06T23:57:33", "db": "PACKETSTORM", "id": "110482" }, { "date": "2012-09-25T00:15:29", "db": "PACKETSTORM", "id": "116825" }, { "date": "2012-01-24T23:58:58", "db": "PACKETSTORM", "id": "109053" }, { "date": "2012-02-10T07:44:13", "db": "PACKETSTORM", "id": "109614" }, { "date": "2012-01-17T01:20:23", "db": "PACKETSTORM", "id": "108735" }, { "date": "2012-01-04T12:12:12", "db": "PACKETSTORM", "id": "169679" }, { "date": "2012-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-057" }, { "date": "2012-01-06T01:55:00.783000", "db": "NVD", "id": "CVE-2011-4108" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-02T00:00:00", "db": "CERT/CC", "id": "VU#737740" }, { "date": "2016-08-23T00:00:00", "db": "VULMON", "id": "CVE-2011-4108" }, { "date": "2015-04-13T21:31:00", "db": "BID", "id": "51281" }, { "date": "2022-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-057" }, { "date": "2016-08-23T02:04:34.680000", "db": "NVD", "id": "CVE-2011-4108" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "110482" }, { "db": "PACKETSTORM", "id": "109053" }, { "db": "PACKETSTORM", "id": "109614" }, { "db": "PACKETSTORM", "id": "108735" }, { "db": "CNNVD", "id": "CNNVD-201201-057" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fiery Network Controllers for Xerox DocuColor 242/252/260 Printer/Copier use a vulnerable version of OpenSSL", "sources": [ { "db": "CERT/CC", "id": "VU#737740" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-057" } ], "trust": 0.6 } }
ghsa-g8h7-34h7-3c73
Vulnerability from github
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
{ "affected": [], "aliases": [ "CVE-2011-4108" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-01-06T01:55:00Z", "severity": "MODERATE" }, "details": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "id": "GHSA-g8h7-34h7-3c73", "modified": "2022-05-17T03:50:08Z", "published": "2022-05-17T03:50:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4108" }, { "type": "WEB", "url": "https://security.paloaltonetworks.com/CVE-2011-4108" }, { "type": "WEB", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc" }, { "type": "WEB", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=132750648501816\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133951357207000\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134039053214295\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/48528" }, { "type": "WEB", "url": "http://secunia.com/advisories/57260" }, { "type": "WEB", "url": "http://secunia.com/advisories/57353" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5784" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2390" }, { "type": "WEB", "url": "http://www.isg.rhul.ac.uk/~kp/dtls.pdf" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/737740" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:006" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:007" }, { "type": "WEB", "url": "http://www.openssl.org/news/secadv_20120104.txt" } ], "schema_version": "1.4.0", "severity": [] }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.