Action not permitted
Modal body text goes here.
CVE-2015-3194
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "78623", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/78623" }, { "name": "20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e" }, { "name": "openSUSE-SU-2016:1332", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" }, { "name": "openSUSE-SU-2015:2288", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" }, { "name": "RHSA-2015:2617", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2617.html" }, { "tags": [ "x_transferred" ], "url": "http://www.fortiguard.com/advisory/openssl-advisory-december-2015" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "SSA:2015-349-04", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.754583" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17" }, { "tags": [ "x_transferred" ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "HPSBGN03536", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=145382583417444\u0026w=2" }, { "name": "USN-2830-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2830-1" }, { "name": "openSUSE-SU-2015:2289", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" }, { "name": "FEDORA-2015-d87d60b9a9", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "tags": [ "x_transferred" ], "url": "http://openssl.org/news/secadv/20151203.txt" }, { "name": "1034294", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034294" }, { "name": "openSUSE-SU-2016:0637", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" }, { "tags": [ "x_transferred" ], "url": "http://fortiguard.com/advisory/openssl-advisory-december-2015" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322" }, { "name": "DSA-3413", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3413" }, { "name": "openSUSE-SU-2015:2318", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "78623", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/78623" }, { "name": "20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products", "tags": [ "vendor-advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e" }, { "name": "openSUSE-SU-2016:1332", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" }, { "name": "openSUSE-SU-2015:2288", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" }, { "name": "RHSA-2015:2617", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2617.html" }, { "url": "http://www.fortiguard.com/advisory/openssl-advisory-december-2015" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "SSA:2015-349-04", "tags": [ "vendor-advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.754583" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17" }, { "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "HPSBGN03536", "tags": [ "vendor-advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=145382583417444\u0026w=2" }, { "name": "USN-2830-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2830-1" }, { "name": "openSUSE-SU-2015:2289", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" }, { "name": "FEDORA-2015-d87d60b9a9", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "91787", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "url": "http://openssl.org/news/secadv/20151203.txt" }, { "name": "1034294", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1034294" }, { "name": "openSUSE-SU-2016:0637", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" }, { "url": "http://fortiguard.com/advisory/openssl-advisory-december-2015" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322" }, { "name": "DSA-3413", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2015/dsa-3413" }, { "name": "openSUSE-SU-2015:2318", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3194", "datePublished": "2015-12-06T00:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-3194\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-12-06T20:59:04.707\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.\"},{\"lang\":\"es\",\"value\":\"crypto/rsa/rsa_ameth.c en OpenSSL 1.0.1 en versiones anteriores a 1.0.1q y 1.0.2 en versiones anteriores a 1.0.2e permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de una firma RSA PSS ASN.1 que carece de un par\u00e1metro de funci\u00f3n de generaci\u00f3n de m\u00e1scara.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C684FB18-FDDC-4BED-A28C-C23EE6CD0094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74A79A7-4FAF-4C81-8622-050008B96AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEDACCB9-8D61-49EE-9957-9E58BC7BB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4993DD56-F9E3-4AC8-AC3E-BF204B950DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E884B241-F9C3-44F8-A420-DE65F5F3D660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A383620-B4F7-44A7-85DA-A4FF2E115D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0C6812-F455-49CF-B29B-9AC00306DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2D462C-A1B4-4572-A615-BDE9DC5F1E55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3703E445-17C0-4C85-A496-A35641C0C8DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4034B9-EF1C-40E6-B92A-D4D7B7E7E774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABEC1927-F469-4B9E-B544-DA6CF90F0B34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE2188F9-FAF8-4A0C-BB49-E95BDBC119BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EC827B-5313-47D7-BF49-CFF033CF3D53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A438E65F-33B1-46BC-AD93-200DCC6B43D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BFDCF78-62C1-429E-A43C-0C9FEC14837D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3E5C1B-EC63-4214-A0BD-0B8681CE6C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F946FD-F564-49DA-B043-5943308BA9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4847BCF3-EFCE-41AF-8E7D-3D51EB9DCC5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B89180B-FB68-4DD8-B076-16E51CC7FB91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C986592-4086-4A39-9767-EF34DBAA6A53\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38D3B7E-8429-473F-BB31-FC3583EE5A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.10.0\",\"versionEndExcluding\":\"0.10.41\",\"matchCriteriaId\":\"6938258D-CD7F-4D26-8AEC-166F699112B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.12.0\",\"versionEndExcluding\":\"0.12.9\",\"matchCriteriaId\":\"7C420E9F-C071-4B7A-A79D-E8C6A699CE01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.2.3\",\"matchCriteriaId\":\"70003343-C6CD-4254-B0FA-934B28278AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.1.1\",\"matchCriteriaId\":\"D2A5B479-9CF7-4DB3-A10E-C093726476E1\"}]}]}],\"references\":[{\"url\":\"http://fortiguard.com/advisory/openssl-advisory-december-2015\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=145382583417444\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://openssl.org/news/secadv/20151203.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2617.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2957.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3413\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.fortiguard.com/advisory/openssl-advisory-december-2015\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/78623\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/91787\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034294\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.754583\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2830-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1288320\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://fortiguard.com/advisory/openssl-advisory-december-2015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=145382583417444\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://openssl.org/news/secadv/20151203.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2617.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2957.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.fortiguard.com/advisory/openssl-advisory-december-2015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/78623\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/91787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.754583\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2830-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1288320\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2016_2957
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services httpd 2.4.23 is now available from the Red Hat Customer Portal for Solaris and Microsoft Windows systems.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat JBoss Core Services httpd 2.4.23 serves as a replacement for JBoss Core Services Apache HTTP Server 2.4.6.\n\nSecurity Fix(es):\n\n* This update fixes several flaws in OpenSSL. (CVE-2014-8176, CVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2177, CVE-2016-2178, CVE-2016-2842)\n\n* This update fixes several flaws in libxml2. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)\n\n* This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420, CVE-2016-7141)\n\n* This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)\n\n* This update fixes two flaws in mod_cluster. (CVE-2016-4459, CVE-2016-8612)\n\n* A buffer overflow flaw when concatenating virtual host names and URIs was fixed in mod_jk. (CVE-2016-6808)\n\n* A memory leak flaw was fixed in expat. (CVE-2012-1148)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-0286, CVE-2016-2108, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Stephen Henson (OpenSSL development team) as the original reporter of CVE-2015-0286; Huzaifa Sidhpurwala (Red Hat), Hanno B\u00f6ck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2105, CVE-2016-2106, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842; Juraj Somorovsky as the original reporter of CVE-2016-2107; Yuval Yarom (University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv University), and Nadia Heninger (University of Pennsylvania) as the original reporters of CVE-2016-0702; and Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.\n\nSee the corresponding CVE pages linked to in the References section for more information about each of the flaws listed in this advisory.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2957", "url": "https://access.redhat.com/errata/RHSA-2016:2957" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=distributions\u0026version=2.4.23", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=distributions\u0026version=2.4.23" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/" }, { "category": "external", "summary": "801648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648" }, { "category": "external", "summary": "1121519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121519" }, { "category": "external", "summary": "1196737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196737" }, { "category": "external", "summary": "1202366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202366" }, { "category": "external", "summary": "1227574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227574" }, { "category": "external", "summary": "1228611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228611" }, { "category": "external", "summary": "1243888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888" }, { "category": "external", "summary": "1288320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "category": "external", "summary": "1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "1288326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288326" }, { "category": "external", "summary": "1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "1310599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310599" }, { "category": "external", "summary": "1311880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311880" }, { "category": "external", "summary": "1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "1319829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319829" }, { "category": "external", "summary": "1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "1332443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332443" }, { "category": "external", "summary": "1332820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332820" }, { "category": "external", "summary": "1338682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338682" }, { "category": "external", "summary": "1338686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686" }, { "category": "external", "summary": "1338691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338691" }, { "category": "external", "summary": "1338696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338696" }, { "category": "external", "summary": "1338700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700" }, { "category": "external", "summary": "1338701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338701" }, { "category": "external", "summary": "1338702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338702" }, { "category": "external", "summary": "1338703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338703" }, { "category": "external", "summary": "1338705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338705" }, { "category": "external", "summary": "1338706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338706" }, { "category": "external", "summary": "1338708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338708" }, { "category": "external", "summary": "1338711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338711" }, { "category": "external", "summary": "1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "1362183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183" }, { "category": "external", "summary": "1362190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190" }, { "category": "external", "summary": "1373229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "category": "external", "summary": "1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2957.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release", "tracking": { "current_release_date": "2024-11-22T05:16:44+00:00", "generator": { "date": "2024-11-22T05:16:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2957", "initial_release_date": "2016-12-15T22:11:19+00:00", "revision_history": [ { "date": "2016-12-15T22:11:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-12-15T22:11:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:16:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0876", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2012-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "786617" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: hash table collisions CPU usage DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0876" }, { "category": "external", "summary": "RHBZ#786617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876" } ], "release_date": "2012-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: hash table collisions CPU usage DoS" }, { "cve": "CVE-2012-1148", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2012-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "801648" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Memory leak in poolGrow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1148" }, { "category": "external", "summary": "RHBZ#801648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1148", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148" } ], "release_date": "2012-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Memory leak in poolGrow" }, { "cve": "CVE-2014-3523", "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1121519" } ], "notes": [ { "category": "description", "text": "Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: WinNT MPM denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Not affected. This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6 and 7, Red Hat JBoss Web Server 1 and 2, and Red Hat JBoss Enterprise Application Platform 5 and 6. This flaw only affects httpd running on Microsoft Windows. Red Hat JBoss Web Server 1 and 2, and Red Hat JBoss Enterprise Application Platform 5 and 6 can be run on Microsoft Windows. However, these products provide httpd 2.2, which is not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3523" }, { "category": "external", "summary": "RHBZ#1121519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3523", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3523" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: WinNT MPM denial of service" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2014-8176", "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228611" } ], "notes": [ { "category": "description", "text": "An invalid-free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could send a specially crafted message to the peer, which could cause the application to crash or potentially result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Invalid free in DTLS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does NOT affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8176" }, { "category": "external", "summary": "RHBZ#1228611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: Invalid free in DTLS" }, { "cve": "CVE-2015-0209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2015-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1196737" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way OpenSSL imported malformed Elliptic Curve private keys. A specially crafted key file could cause an application using OpenSSL to crash when imported.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: use-after-free on invalid EC private key import", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0209" }, { "category": "external", "summary": "RHBZ#1196737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196737" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209" }, { "category": "external", "summary": "https://access.redhat.com/articles/1384453", "url": "https://access.redhat.com/articles/1384453" }, { "category": "external", "summary": "https://openssl.org/news/secadv_20150319.txt", "url": "https://openssl.org/news/secadv_20150319.txt" } ], "release_date": "2015-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: use-after-free on invalid EC private key import" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Stephen Henson" ], "organization": "OpenSSL development team", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2015-0286", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1202366" } ], "notes": [ { "category": "description", "text": "An invalid pointer use flaw was found in OpenSSL\u0027s ASN1_TYPE_cmp() function. A remote attacker could crash a TLS/SSL client or server using OpenSSL via a specially crafted X.509 certificate when the attacker-supplied certificate was verified by the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: invalid pointer use in ASN1_TYPE_cmp()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0286" }, { "category": "external", "summary": "RHBZ#1202366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286" }, { "category": "external", "summary": "https://access.redhat.com/articles/1384453", "url": "https://access.redhat.com/articles/1384453" }, { "category": "external", "summary": "https://openssl.org/news/secadv_20150319.txt", "url": "https://openssl.org/news/secadv_20150319.txt" } ], "release_date": "2015-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: invalid pointer use in ASN1_TYPE_cmp()" }, { "cve": "CVE-2015-3185", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2015-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243888" } ], "notes": [ { "category": "description", "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3185" }, { "category": "external", "summary": "RHBZ#1243888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16", "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16" } ], "release_date": "2015-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4" }, { "cve": "CVE-2015-3194", "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288320" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacker could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Certificate verify crash with missing PSS parameter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3194" }, { "category": "external", "summary": "RHBZ#1288320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3194", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2016-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Certificate verify crash with missing PSS parameter" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288322" } ], "notes": [ { "category": "description", "text": "A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X509_ATTRIBUTE memory leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3195" }, { "category": "external", "summary": "RHBZ#1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3195", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: X509_ATTRIBUTE memory leak" }, { "cve": "CVE-2015-3196", "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288326" } ], "notes": [ { "category": "description", "text": "A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Race condition handling PSK identify hint", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3196" }, { "category": "external", "summary": "RHBZ#1288326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3196", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Race condition handling PSK identify hint" }, { "cve": "CVE-2015-3216", "discovery_date": "2015-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1227574" } ], "notes": [ { "category": "description", "text": "A regression was found in the ssleay_rand_bytes() function in the versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7. This regression could cause a multi-threaded application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Crash in ssleay_rand_bytes due to locking regression", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3216" }, { "category": "external", "summary": "RHBZ#1227574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227574" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3216", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3216" } ], "release_date": "2015-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Crash in ssleay_rand_bytes due to locking regression" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Daniel Genkin" ], "organization": "Technion and Tel Aviv University", "summary": "Acknowledged by upstream." }, { "names": [ "Nadia Heninger" ], "organization": "University of Pennsylvania", "summary": "Acknowledged by upstream." }, { "names": [ "Yuval Yarom" ], "organization": "University of Adelaide and NICTA", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0702", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310599" } ], "notes": [ { "category": "description", "text": "A side-channel attack was found that makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture. An attacker who has the ability to control code in a thread running on the same hyper-threaded core as the victim\u0027s thread that is performing decryption, could use this flaw to recover RSA private keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Side channel attack on modular exponentiation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0702" }, { "category": "external", "summary": "RHBZ#1310599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310599" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0702", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702" }, { "category": "external", "summary": "http://cachebleed.info/", "url": "http://cachebleed.info/" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160301.txt", "url": "https://www.openssl.org/news/secadv/20160301.txt" } ], "release_date": "2016-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Side channel attack on modular exponentiation" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Adam Langley" ], "organization": "Google/BoringSSL", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0705", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310596" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Double-free in DSA code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0705" }, { "category": "external", "summary": "RHBZ#1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" } ], "release_date": "2016-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Double-free in DSA code" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0797", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1311880" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a NULL pointer dereference or a heap-based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0797" }, { "category": "external", "summary": "RHBZ#1311880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0797", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160301.txt", "url": "https://www.openssl.org/news/secadv/20160301.txt" } ], "release_date": "2016-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0799", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1312219" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Fix memory issues in BIO_*printf functions", "title": "Vulnerability summary" }, { "category": "other", "text": "The original issue fixed by OpenSSL upstream contains two distinct fixes. The first one is a format string flaw in the internal fmtstr functions, which may result in a OOB read flaw when printing very large string. This issue was assigned CVE-2016-0799\n\nThe second issue relates to the internal doapr_outch function of OpenSSL. It can result in an OOB write, or cause memory leaks. This issue has been assigned CVE-2016-2842 by MITRE as is now tracked as https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2842", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0799" }, { "category": "external", "summary": "RHBZ#1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0799", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" } ], "release_date": "2016-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Fix memory issues in BIO_*printf functions" }, { "cve": "CVE-2016-1762", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338711" } ], "notes": [ { "category": "description", "text": "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer-overread in xmlNextChar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1762" }, { "category": "external", "summary": "RHBZ#1338711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1762", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1762" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer-overread in xmlNextChar" }, { "cve": "CVE-2016-1833", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338682" } ], "notes": [ { "category": "description", "text": "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in htmlCurrentChar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1833" }, { "category": "external", "summary": "RHBZ#1338682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1833", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1833" } ], "release_date": "2015-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in htmlCurrentChar" }, { "cve": "CVE-2016-1834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338708" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-buffer-overflow in xmlStrncat", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1834" }, { "category": "external", "summary": "RHBZ#1338708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1834", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1834" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Heap-buffer-overflow in xmlStrncat" }, { "cve": "CVE-2016-1835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338691" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in xmlSAX2AttributeNs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1835" }, { "category": "external", "summary": "RHBZ#1338691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1835", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1835" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in xmlSAX2AttributeNs" }, { "cve": "CVE-2016-1836", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338702" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in xmlDictComputeFastKey", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1836" }, { "category": "external", "summary": "RHBZ#1338702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1836", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1836" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in xmlDictComputeFastKey" }, { "cve": "CVE-2016-1837", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338696" } ], "notes": [ { "category": "description", "text": "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1837" }, { "category": "external", "summary": "RHBZ#1338696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1837", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1837" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral" }, { "cve": "CVE-2016-1838", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338705" } ], "notes": [ { "category": "description", "text": "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1838" }, { "category": "external", "summary": "RHBZ#1338705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1838", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1838" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal" }, { "cve": "CVE-2016-1839", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338703" } ], "notes": [ { "category": "description", "text": "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in xmlDictAddString", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1839" }, { "category": "external", "summary": "RHBZ#1338703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338703" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1839", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1839" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1839", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1839" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in xmlDictAddString" }, { "cve": "CVE-2016-1840", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338706" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1840" }, { "category": "external", "summary": "RHBZ#1338706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1840", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1840" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2105", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331441" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncodeUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "RHBZ#1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncodeUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2106", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331536" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncryptUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "RHBZ#1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncryptUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Juraj Somorovsky" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2107", "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331426" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Padding oracle in AES-NI CBC MAC check", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2107" }, { "category": "external", "summary": "RHBZ#1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2107", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Padding oracle in AES-NI CBC MAC check" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1330101" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ASN.1 BIO handling of large amounts of data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "RHBZ#1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: ASN.1 BIO handling of large amounts of data" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341705" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Possible integer overflow vulnerabilities in codebase", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "RHBZ#1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2177", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Possible integer overflow vulnerabilities in codebase" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2016-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343400" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Non-constant time codepath followed for certain operations in DSA implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "RHBZ#1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "http://eprint.iacr.org/2016/594", "url": "http://eprint.iacr.org/2016/594" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Non-constant time codepath followed for certain operations in DSA implementation" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2842", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314757" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: doapr_outch function does not verify that certain memory allocation succeeds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2842" }, { "category": "external", "summary": "RHBZ#1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2842", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2842" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842" } ], "release_date": "2016-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: doapr_outch function does not verify that certain memory allocation succeeds" }, { "cve": "CVE-2016-3627", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1319829" } ], "notes": [ { "category": "description", "text": "Missing recursive loop detection checks were found in the xmlParserEntityCheck() and xmlStringGetNodeList() functions of libxml2, causing application using the library to crash by stack exhaustion while building the associated data. An attacker able to send XML data to be parsed in recovery mode could launch a Denial of Service on the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack exhaustion while parsing xml files in recovery mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3627" }, { "category": "external", "summary": "RHBZ#1319829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3627" } ], "release_date": "2016-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack exhaustion while parsing xml files in recovery mode" }, { "cve": "CVE-2016-3705", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1332443" } ], "notes": [ { "category": "description", "text": "Missing incrementation of recursion depth counter were found in the xmlParserEntityCheck() and xmlParseAttValueComplex() functions used for parsing XML data. An attacker could launch a Denial of Service attack by passing specially crafted XML data to an application, forcing it to crash due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack overflow before detecting invalid XML file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3705" }, { "category": "external", "summary": "RHBZ#1332443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332443" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3705" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack overflow before detecting invalid XML file" }, { "cve": "CVE-2016-4447", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338686" } ], "notes": [ { "category": "description", "text": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer underreads due to xmlParseName", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4447" }, { "category": "external", "summary": "RHBZ#1338686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4447", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4447" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer underreads due to xmlParseName" }, { "cve": "CVE-2016-4448", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338700" } ], "notes": [ { "category": "description", "text": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Format string vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4448" }, { "category": "external", "summary": "RHBZ#1338700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4448", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4448" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Format string vulnerability" }, { "cve": "CVE-2016-4449", "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338701" } ], "notes": [ { "category": "description", "text": "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Inappropriate fetch of entities content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4449" }, { "category": "external", "summary": "RHBZ#1338701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338701" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4449", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4449" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Inappropriate fetch of entities content" }, { "acknowledgments": [ { "names": [ "Robert Bost" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4459", "discovery_date": "2016-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341583" } ], "notes": [ { "category": "description", "text": "It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4459" }, { "category": "external", "summary": "RHBZ#1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4459", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459" } ], "release_date": "2016-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 3.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute" }, { "cve": "CVE-2016-4483", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1332820" } ], "notes": [ { "category": "description", "text": "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: out-of-bounds read", "title": "Vulnerability summary" }, { "category": "other", "text": "When a specially-crafted XML file is parsed via an application compiled against libxml2, this can cause the application to crash. (No code execution)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4483" }, { "category": "external", "summary": "RHBZ#1332820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332820" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4483", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4483" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: out-of-bounds read" }, { "cve": "CVE-2016-5419", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1362183" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library did not prevent TLS session resumption when the client certificate had changed. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: TLS session resumption client cert bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5419" }, { "category": "external", "summary": "RHBZ#1362183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5419", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5419" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160803A.html", "url": "https://curl.haxx.se/docs/adv_20160803A.html" } ], "release_date": "2016-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: TLS session resumption client cert bypass" }, { "cve": "CVE-2016-5420", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1362190" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library did not check the client certificate when choosing the TLS connection to reuse. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Re-using connection with wrong client cert", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5420" }, { "category": "external", "summary": "RHBZ#1362190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5420", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5420" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160803B.html", "url": "https://curl.haxx.se/docs/adv_20160803B.html" } ], "release_date": "2016-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Re-using connection with wrong client cert" }, { "cve": "CVE-2016-6808", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2016-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1382352" } ], "notes": [ { "category": "description", "text": "It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_jk: Buffer overflow when concatenating virtual host name and URI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6808" }, { "category": "external", "summary": "RHBZ#1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6808", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808" }, { "category": "external", "summary": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42", "url": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42" } ], "release_date": "2016-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mod_jk: Buffer overflow when concatenating virtual host name and URI" }, { "cve": "CVE-2016-7141", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1373229" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library using the NSS (Network Security Services) library as TLS/SSL backend incorrectly re-used client certificates for subsequent TLS connections in certain cases. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Incorrect reuse of client certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7141" }, { "category": "external", "summary": "RHBZ#1373229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7141", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7141" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160907.html", "url": "https://curl.haxx.se/docs/adv_20160907.html" } ], "release_date": "2016-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Incorrect reuse of client certificates" }, { "cve": "CVE-2016-8612", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1387605" } ], "notes": [ { "category": "description", "text": "An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Protocol parsing logic error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8612" }, { "category": "external", "summary": "RHBZ#1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8612", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612" } ], "release_date": "2016-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Protocol parsing logic error" } ] }
rhsa-2015_2617
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nA NULL pointer derefernce flaw was found in the way OpenSSL verified\nsignatures using the RSA PSS algorithm. A remote attacked could possibly\nuse this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server\nusing OpenSSL if it enabled client authentication. (CVE-2015-3194)\n\nA memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and\nCMS data. A remote attacker could use this flaw to cause an application\nthat parses PKCS#7 or CMS data from untrusted sources to use an excessive\namount of memory and possibly crash. (CVE-2015-3195)\n\nA race condition flaw, leading to a double free, was found in the way\nOpenSSL handled pre-shared key (PSK) identify hints. A remote attacker\ncould use this flaw to crash a multi-threaded SSL/TLS client using\nOpenSSL. (CVE-2015-3196)\n\nAll openssl users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library must be restarted, or\nthe system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2617", "url": "https://access.redhat.com/errata/RHSA-2015:2617" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" }, { "category": "external", "summary": "1288320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "category": "external", "summary": "1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "1288326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288326" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2015/rhsa-2015_2617.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-09-15T23:01:31+00:00", "generator": { "date": "2024-09-15T23:01:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2015:2617", "initial_release_date": "2015-12-14T04:47:00+00:00", "revision_history": [ { "date": "2015-12-14T04:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-14T04:47:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-15T23:01:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "product_id": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "product": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "product_id": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-51.el7_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "product": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "product_id": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "product": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "product_id": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el6_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "product": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "product_id": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el6_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "product": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "product_id": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "product_id": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.1.ppc", "product": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc", "product_id": "openssl-0:1.0.1e-42.el6_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "product_id": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "product": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "product_id": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-51.el7_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.1.s390x", "product": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x", "product_id": "openssl-1:1.0.1e-51.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "product": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "product_id": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el6_7.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "product": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "product_id": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el6_7.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.1.s390x", "product": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x", "product_id": "openssl-0:1.0.1e-42.el6_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "product_id": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.1?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.1?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.1.s390", "product": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390", "product_id": "openssl-0:1.0.1e-42.el6_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "product": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "product_id": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-51.el7_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "product_id": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "product": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "product_id": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "product_id": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el6_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "product": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "product_id": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el6_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "product": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "product_id": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "product_id": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "product": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "product_id": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el6_7.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "product": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "product_id": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el6_7.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.1.i686", "product": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686", "product_id": "openssl-0:1.0.1e-42.el6_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "product": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "product_id": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-51.el7_2.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "product_id": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "product": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "product_id": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.1.src", "product": { "name": "openssl-1:1.0.1e-51.el7_2.1.src", "product_id": "openssl-1:1.0.1e-51.el7_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.1?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.1.src", "product": { "name": "openssl-0:1.0.1e-42.el6_7.1.src", "product_id": "openssl-0:1.0.1e-42.el6_7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.src", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.src", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.src", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.src", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.src", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.src", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.src", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3194", "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288320" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacker could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Certificate verify crash with missing PSS parameter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3194" }, { "category": "external", "summary": "RHBZ#1288320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3194", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2016-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2617" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Certificate verify crash with missing PSS parameter" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288322" } ], "notes": [ { "category": "description", "text": "A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X509_ATTRIBUTE memory leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3195" }, { "category": "external", "summary": "RHBZ#1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3195", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2617" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: X509_ATTRIBUTE memory leak" }, { "cve": "CVE-2015-3196", "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288326" } ], "notes": [ { "category": "description", "text": "A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Race condition handling PSK identify hint", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3196" }, { "category": "external", "summary": "RHBZ#1288326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3196", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2617" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Client-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Client-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6ComputeNode-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6ComputeNode-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Server-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Server-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.src", "6Workstation-optional-6.7.z:openssl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-debuginfo-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-devel-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-perl-0:1.0.1e-42.el6_7.1.x86_64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.i686", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.ppc64", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.s390x", "6Workstation-optional-6.7.z:openssl-static-0:1.0.1e-42.el6_7.1.x86_64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Race condition handling PSK identify hint" } ] }
var-201512-0483
Vulnerability from variot
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to crash the affected application; denying service to legitimate users. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2016-10-27-1 Xcode 8.1
Xcode 8.1 is now available and addresses the following:
IDE Xcode Server Available for: OS X El Capitan v10.11.5 and later Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: Multiple issues existed in Node.js in Xcode Server. These issues were addressed by updating to Node.js version 4.5.0. CVE-2016-1669 CVE-2016-0705 CVE-2016-0797 CVE-2016-0702 CVE-2016-2086 CVE-2016-2216 CVE-2015-8027 CVE-2015-3193 CVE-2015-3194 CVE-2015-6764
Xcode 8.1 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
- Select Xcode in the menu bar
- Select About Xcode
- The version after applying this update will be "8.1". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2018-10-30-9 Additional information for APPLE-SA-2018-9-24-1 macOS Mojave 10.14
macOS Mojave 10.14 addresses the following:
Bluetooth Available for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012) , iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac (Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015), Mac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012) , Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro (Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air (13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air (13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air (13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air (13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro (15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013), MacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina, 13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013) Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2018-5383: Lior Neumann and Eli Biham
The updates below are available for these Mac models: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013, Mid 2010, and Mid 2012 models with recommended Metal-capable graphics processor, including MSI Gaming Radeon RX 560 and Sapphire Radeon PULSE RX 580)
afpserver Impact: A remote attacker may be able to attack AFP servers through HTTP clients Description: An input validation issue was addressed with improved input validation. CVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC Berkeley Entry added October 30, 2018
App Store Impact: A malicious application may be able to determine the Apple ID of the owner of the computer Description: A permissions issue existed in the handling of the Apple ID. This issue was addressed with improved access controls. CVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc.
AppleGraphicsControl Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4417: Lee of the Information Security Lab Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Application Firewall Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A configuration issue was addressed with additional restrictions. CVE-2018-4353: Abhinav Bansal of LinkedIn Inc.
APR Impact: Multiple buffer overflow issues existed in Perl Description: Multiple issues in Perl were addressed with improved memory handling. CVE-2017-12613: Craig Young of Tripwire VERT CVE-2017-12618: Craig Young of Tripwire VERT Entry added October 30, 2018
ATS Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
ATS Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4308: Mohamed Ghannam (@_simo36) Entry added October 30, 2018
Auto Unlock Impact: A malicious application may be able to access local users AppleIDs Description: A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. CVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc.
CFNetwork Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
CoreFoundation Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4412: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018
CoreFoundation Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4414: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018
CoreText Impact: Processing a maliciously crafted text file may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2018-4347: an anonymous researcher Entry added October 30, 2018
Crash Reporter Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4333: Brandon Azad
CUPS Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary content Description: An injection issue was addressed with improved validation. CVE-2018-4153: Michael Hanselmann of hansmi.ch Entry added October 30, 2018
CUPS Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4406: Michael Hanselmann of hansmi.ch Entry added October 30, 2018
Dictionary Impact: Parsing a maliciously crafted dictionary file may lead to disclosure of user information Description: A validation issue existed which allowed local file access. This was addressed with input sanitization. CVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing Entry added October 30, 2018
Grand Central Dispatch Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4426: Brandon Azad Entry added October 30, 2018
Heimdal Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4331: Brandon Azad CVE-2018-4332: Brandon Azad CVE-2018-4343: Brandon Azad Entry added October 30, 2018
Hypervisor Impact: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis Description: An information disclosure issue was addressed by flushing the L1 data cache at the virtual machine entry. CVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas F. Wenisch of University of Michigan, Mark Silberstein and Marina Minkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens of KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu of Intel Corporation, Yuval Yarom of The University of Adelaide Entry added October 30, 2018
iBooks Impact: Parsing a maliciously crafted iBooks file may lead to disclosure of user information Description: A configuration issue was addressed with additional restrictions. CVE-2018-4355: evi1m0 of bilibili security team Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4396: Yu Wang of Didi Research America CVE-2018-4418: Yu Wang of Didi Research America Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2018-4351: Appology Team @ Theori working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4350: Yu Wang of Didi Research America Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4334: Ian Beer of Google Project Zero Entry added October 30, 2018
IOHIDFamily Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation CVE-2018-4408: Ian Beer of Google Project Zero Entry added October 30, 2018
IOKit Impact: A malicious application may be able to break out of its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4341: Ian Beer of Google Project Zero CVE-2018-4354: Ian Beer of Google Project Zero Entry added October 30, 2018
IOKit Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2018-4383: Apple Entry added October 30, 2018
IOUserEthernet Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4401: Apple Entry added October 30, 2018
Kernel Impact: A malicious application may be able to leak sensitive user information Description: An access issue existed with privileged API calls. This issue was addressed with additional restrictions. CVE-2018-4399: Fabiano Anemone (@anoane) Entry added October 30, 2018
Kernel Impact: An attacker in a privileged network position may be able to execute arbitrary code Description: A memory corruption issue was addressed with improved validation. CVE-2018-4407: Kevin Backhouse of Semmle Ltd. Entry added October 30, 2018
Kernel Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4336: Brandon Azad CVE-2018-4337: Ian Beer of Google Project Zero CVE-2018-4340: Mohamed Ghannam (@_simo36) CVE-2018-4344: The UK's National Cyber Security Centre (NCSC) CVE-2018-4425: cc working with Trend Micro's Zero Day Initiative, Juwei Lin (@panicaII) of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
LibreSSL Impact: Multiple issues in libressl were addressed in this update Description: Multiple issues were addressed by updating to libressl version 2.6.4. CVE-2015-3194 CVE-2015-5333 CVE-2015-5334 CVE-2016-702 Entry added October 30, 2018
Login Window Impact: A local user may be able to cause a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of MWR InfoSecurity Entry added October 30, 2018
mDNSOffloadUserClient Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4326: an anonymous researcher working with Trend Micro's Zero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team Entry added October 30, 2018
MediaRemote Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions. CVE-2018-4310: CodeColorist of Ant-Financial LightYear Labs Entry added October 30, 2018
Microcode Impact: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis Description: An information disclosure issue was addressed with a microcode update. This ensures that older data read from recently-written-to addresses cannot be read via a speculative side-channel. CVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken Johnson of the Microsoft Security Response Center (MSRC) Entry added October 30, 2018
Security Impact: A local user may be able to cause a denial of service Description: This issue was addressed with improved checks. CVE-2018-4395: Patrick Wardle of Digita Security Entry added October 30, 2018
Security Impact: An attacker may be able to exploit weaknesses in the RC4 cryptographic algorithm Description: This issue was addressed by removing RC4. CVE-2016-1777: Pepi Zawodsky
Spotlight Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4393: Lufeng Li Entry added October 30, 2018
Symptom Framework Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Text Impact: Processing a maliciously crafted text file may lead to a denial of service Description: A denial of service issue was addressed with improved validation. CVE-2018-4304: jianan.huang (@Sevck) Entry added October 30, 2018
Wi-Fi Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Additional recognition
Accessibility Framework We would like to acknowledge Ryan Govostes for their assistance.
Core Data We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance.
CoreDAV We would like to acknowledge an anonymous researcher for their assistance.
CoreGraphics We would like to acknowledge Nitin Arya of Roblox Corporation for their assistance.
CoreSymbolication We would like to acknowledge Brandon Azad for their assistance.
IOUSBHostFamily We would like to acknowledge an anonymous researcher for their assistance.
Kernel We would like to acknowledge Brandon Azad for their assistance.
Mail We would like to acknowledge Alessandro Avagliano of Rocket Internet SE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron Software Systems, and Zbyszek A>>A3Akiewski for their assistance.
Quick Look We would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing and Patrick Wardle of Digita Security and lokihardt of Google Project Zero for their assistance.
Security We would like to acknowledge Christoph Sinai, Daniel Dudek (@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak) of ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of Shapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson Ding, and an anonymous researcher for their assistance.
SQLite We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance.
Terminal We would like to acknowledge an anonymous researcher for their assistance.
WindowServer We would like to acknowledge Patrick Wardle of Digita Security for their assistance.
Installation note:
macOS Mojave 10.14 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgYpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3GrtxAA iVBcAdusz88zFzkT05EIxb9nSp4CGOlhKlChK4N7Db17o2fNT0hNpQixEAC0wC/A zqIzsXEzZlPobI4OnwiEVs7lVBsvCW+IarrRZ8pgSllKs1VlbNfOO3z9vB5BqJMr d9PjPvtHyG3jZmWqQPIjvJb3l3ZjHAt+HAvTItNMkhIUjqV80JI8wP3erzIf3tAt VoLIw5iL5w4HAYcWsn9DYcecXZdv39MnKL5UGzMX3bkee2U7kGYtgskU+mdPa1Wl WzquIPlLeKL2KNSXEfbkPtcKM/fvkURsNzEDvg+PBQLdI3JeR1bOeN24aiTEtiEL TecGm/kKMMJWmDdhPhFvZVD+SIdZd4LgbTawR1UE1JJg7jnEZKCvZ45mXd2eBwn/ rpEKCLBsgA59GILs3ZjZSIWskRJPzZrt463AKcN2wukkTUUkY1rhRVdOf6LZMs9Z w9iJOua3vt+HzCCxTEaH53WUeM6fn/Yeq+DGIS5Fk0G09pU7tsyJVwj3o1nJn0dl e2mcrXBJeSmi6bvvkJX45y/Y8E8Qr+ovS4uN8wG6DOWcCBQkDkugabng8vNh8GST 1wNnV9JY/CmYbU0ZIwKbbSDkcQLQuIl7kKaZMHnU74EytcKscUqqx1VqINz1tssu 1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k= =i9YR -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c04944173
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04944173 Version: 1
HPSBGN03536 rev.1 - HP IceWall Products running OpenSSL, Remote and Local Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2016-01-22 Last Updated: 2016-01-22
Potential Security Impact: Denial of Service (DoS), Remote Denial of Service (DoS)
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY Security vulnerabilities in the OpenSSL library could potentially impact HPE IceWall products resulting in local or remote Denial of Service (DoS).
References:
- CVE-2015-3194 (Certificate verify crash with missing PSS parameter)
- CVE-2015-3195 (X509_ATTRIBUTE memory leak)
- CVE-2015-3196 (Certificate verify crash with missing PSS parameter)
- PSRT110014
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Product Impacted CVEs
IceWall MCRP 3.0 CVE-2015-3195
IceWall MCRP 3.0 (HP-UX only) CVE-2015-3196
IceWall SSO Agent Option 10.0 CVE-2015-3194, CVE-2015-3195
IceWall SSO Agent Option 10.0 (RHEL7 or HP-UX only) CVE-2015-3196
IceWall SSO Certd 10.0 CVE-2015-3196
IceWall SSO Dfw 10.0 CVE-2015-3194, CVE-2015-3195
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-3194 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-3195 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2015-3196 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HPE recommends applying the latest OS vendor security patches for OpenSSL to resolve the vulnerabilities for HP IceWall Products.
HP IceWall SSO Dfw 10.0 and Certd 10.0, which are running on RHEL, could be using either the OS bundled OpenSSL library or the OpenSSL bundled with HP IceWall. If still using the OpenSSL bundled with HP IceWall, please apply the latest OS vendor security patches for OpenSSL and switch to the OpenSSL library bundled with the OS.
Documents are available at the following location with instructions to switch to the OS bundled OpenSSL library:
http://www.hp.com/jp/icewall_patchaccess
Please note that the HP IceWall product is only available in Japan.
HISTORY Version:1 (rev.1) - 22 January 2016 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), execution of arbitrary code, disclosure of information, Cross-site Request Forgery (CSRF), and Cross-site scripting (XSS). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release Advisory ID: RHSA-2016:2957-01 Product: Red Hat JBoss Core Services Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2957.html Issue date: 2016-12-15 CVE Names: CVE-2012-1148 CVE-2014-3523 CVE-2014-8176 CVE-2015-0209 CVE-2015-0286 CVE-2015-3185 CVE-2015-3194 CVE-2015-3195 CVE-2015-3196 CVE-2015-3216 CVE-2016-0702 CVE-2016-0705 CVE-2016-0797 CVE-2016-0799 CVE-2016-1762 CVE-2016-1833 CVE-2016-1834 CVE-2016-1835 CVE-2016-1836 CVE-2016-1837 CVE-2016-1838 CVE-2016-1839 CVE-2016-1840 CVE-2016-2105 CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 CVE-2016-2177 CVE-2016-2178 CVE-2016-2842 CVE-2016-3627 CVE-2016-3705 CVE-2016-4447 CVE-2016-4448 CVE-2016-4449 CVE-2016-4459 CVE-2016-4483 CVE-2016-5419 CVE-2016-5420 CVE-2016-6808 CVE-2016-7141 CVE-2016-8612 =====================================================================
- Summary:
Red Hat JBoss Core Services httpd 2.4.23 is now available from the Red Hat Customer Portal for Solaris and Microsoft Windows systems.
Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
This release of Red Hat JBoss Core Services httpd 2.4.23 serves as a replacement for JBoss Core Services Apache HTTP Server 2.4.6.
Security Fix(es):
-
This update fixes several flaws in OpenSSL. (CVE-2014-8176, CVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2177, CVE-2016-2178, CVE-2016-2842)
-
This update fixes several flaws in libxml2. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)
-
This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420, CVE-2016-7141)
-
This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)
-
This update fixes two flaws in mod_cluster. (CVE-2016-4459, CVE-2016-8612)
-
A buffer overflow flaw when concatenating virtual host names and URIs was fixed in mod_jk. (CVE-2016-6808)
-
A memory leak flaw was fixed in expat. (CVE-2012-1148)
Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-0286, CVE-2016-2108, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Stephen Henson (OpenSSL development team) as the original reporter of CVE-2015-0286; Huzaifa Sidhpurwala (Red Hat), Hanno BAPck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2105, CVE-2016-2106, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842; Juraj Somorovsky as the original reporter of CVE-2016-2107; Yuval Yarom (University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv University), and Nadia Heninger (University of Pennsylvania) as the original reporters of CVE-2016-0702; and Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.
See the corresponding CVE pages linked to in the References section for more information about each of the flaws listed in this advisory.
- Solution:
The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).
After installing the updated packages, the httpd daemon will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
801648 - CVE-2012-1148 expat: Memory leak in poolGrow 1121519 - CVE-2014-3523 httpd: WinNT MPM denial of service 1196737 - CVE-2015-0209 openssl: use-after-free on invalid EC private key import 1202366 - CVE-2015-0286 openssl: invalid pointer use in ASN1_TYPE_cmp() 1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression 1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS 1243888 - CVE-2015-3185 httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 1288320 - CVE-2015-3194 OpenSSL: Certificate verify crash with missing PSS parameter 1288322 - CVE-2015-3195 OpenSSL: X509_ATTRIBUTE memory leak 1288326 - CVE-2015-3196 OpenSSL: Race condition handling PSK identify hint 1310596 - CVE-2016-0705 OpenSSL: Double-free in DSA code 1310599 - CVE-2016-0702 OpenSSL: Side channel attack on modular exponentiation 1311880 - CVE-2016-0797 OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption 1312219 - CVE-2016-0799 OpenSSL: Fix memory issues in BIO_*printf functions 1314757 - CVE-2016-2842 openssl: doapr_outch function does not verify that certain memory allocation succeeds 1319829 - CVE-2016-3627 libxml2: stack exhaustion while parsing xml files in recovery mode 1330101 - CVE-2016-2109 openssl: ASN.1 BIO handling of large amounts of data 1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder 1331426 - CVE-2016-2107 openssl: Padding oracle in AES-NI CBC MAC check 1331441 - CVE-2016-2105 openssl: EVP_EncodeUpdate overflow 1331536 - CVE-2016-2106 openssl: EVP_EncryptUpdate overflow 1332443 - CVE-2016-3705 libxml2: stack overflow before detecting invalid XML file 1332820 - CVE-2016-4483 libxml2: out-of-bounds read 1338682 - CVE-2016-1833 libxml2: Heap-based buffer overread in htmlCurrentChar 1338686 - CVE-2016-4447 libxml2: Heap-based buffer underreads due to xmlParseName 1338691 - CVE-2016-1835 libxml2: Heap use-after-free in xmlSAX2AttributeNs 1338696 - CVE-2016-1837 libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral 1338700 - CVE-2016-4448 libxml2: Format string vulnerability 1338701 - CVE-2016-4449 libxml2: Inappropriate fetch of entities content 1338702 - CVE-2016-1836 libxml2: Heap use-after-free in xmlDictComputeFastKey 1338703 - CVE-2016-1839 libxml2: Heap-based buffer overread in xmlDictAddString 1338705 - CVE-2016-1838 libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal 1338706 - CVE-2016-1840 libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup 1338708 - CVE-2016-1834 libxml2: Heap-buffer-overflow in xmlStrncat 1338711 - CVE-2016-1762 libxml2: Heap-based buffer-overread in xmlNextChar 1341583 - CVE-2016-4459 mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute 1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase 1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation 1362183 - CVE-2016-5419 curl: TLS session resumption client cert bypass 1362190 - CVE-2016-5420 curl: Re-using connection with wrong client cert 1373229 - CVE-2016-7141 curl: Incorrect reuse of client certificates 1382352 - CVE-2016-6808 mod_jk: Buffer overflow when concatenating virtual host name and URI 1387605 - CVE-2016-8612 JBCS mod_cluster: Protocol parsing logic error
- JIRA issues fixed (https://issues.jboss.org/):
JBCS-50 - CVE-2012-1148 CVE-2012-0876 expat: various flaws [jbews-3.0.0] JBCS-95 - CVE-2014-3523 httpd: WinNT MPM denial of service
- References:
https://access.redhat.com/security/cve/CVE-2012-1148 https://access.redhat.com/security/cve/CVE-2014-3523 https://access.redhat.com/security/cve/CVE-2014-8176 https://access.redhat.com/security/cve/CVE-2015-0209 https://access.redhat.com/security/cve/CVE-2015-0286 https://access.redhat.com/security/cve/CVE-2015-3185 https://access.redhat.com/security/cve/CVE-2015-3194 https://access.redhat.com/security/cve/CVE-2015-3195 https://access.redhat.com/security/cve/CVE-2015-3196 https://access.redhat.com/security/cve/CVE-2015-3216 https://access.redhat.com/security/cve/CVE-2016-0702 https://access.redhat.com/security/cve/CVE-2016-0705 https://access.redhat.com/security/cve/CVE-2016-0797 https://access.redhat.com/security/cve/CVE-2016-0799 https://access.redhat.com/security/cve/CVE-2016-1762 https://access.redhat.com/security/cve/CVE-2016-1833 https://access.redhat.com/security/cve/CVE-2016-1834 https://access.redhat.com/security/cve/CVE-2016-1835 https://access.redhat.com/security/cve/CVE-2016-1836 https://access.redhat.com/security/cve/CVE-2016-1837 https://access.redhat.com/security/cve/CVE-2016-1838 https://access.redhat.com/security/cve/CVE-2016-1839 https://access.redhat.com/security/cve/CVE-2016-1840 https://access.redhat.com/security/cve/CVE-2016-2105 https://access.redhat.com/security/cve/CVE-2016-2106 https://access.redhat.com/security/cve/CVE-2016-2107 https://access.redhat.com/security/cve/CVE-2016-2108 https://access.redhat.com/security/cve/CVE-2016-2109 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-2842 https://access.redhat.com/security/cve/CVE-2016-3627 https://access.redhat.com/security/cve/CVE-2016-3705 https://access.redhat.com/security/cve/CVE-2016-4447 https://access.redhat.com/security/cve/CVE-2016-4448 https://access.redhat.com/security/cve/CVE-2016-4449 https://access.redhat.com/security/cve/CVE-2016-4459 https://access.redhat.com/security/cve/CVE-2016-4483 https://access.redhat.com/security/cve/CVE-2016-5419 https://access.redhat.com/security/cve/CVE-2016-5420 https://access.redhat.com/security/cve/CVE-2016-6808 https://access.redhat.com/security/cve/CVE-2016-7141 https://access.redhat.com/security/cve/CVE-2016-8612 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=distributions&version=2.4.23 https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFYUxXtXlSAg2UNWIIRAm8yAKCDdIPhumydPcD3R7BVWXFnyHP/ZwCeJtAh OqjNSGx5/peirmVPrdVKUYE= =TZLU -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-3413-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso December 04, 2015 https://www.debian.org/security/faq
Package : openssl CVE ID : CVE-2015-3194 CVE-2015-3195 CVE-2015-3196
Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.
CVE-2015-3195
Adam Langley of Google/BoringSSL discovered that OpenSSL will leak
memory when presented with a malformed X509_ATTRIBUTE structure.
CVE-2015-3196
A race condition flaw in the handling of PSK identify hints was
discovered, potentially leading to a double free of the identify
hint data.
For the oldstable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u18.
For the stable distribution (jessie), these problems have been fixed in version 1.0.1k-3+deb8u2.
For the unstable distribution (sid), these problems have been fixed in version 1.0.2e-1 or earlier.
We recommend that you upgrade your openssl packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0483", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1j" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "5.1.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1p" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2d" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "0.12.9" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1m" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1b" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "0.10.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2a" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "5.0.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1h" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "4.2.3" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "15.10" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "4.0.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1o" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1g" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "15.04" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "0.10.41" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1n" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2c" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "0.12.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2.0.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.5.0.6" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.14" }, { "model": "10.2-rc1-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "security network controller 1.0.3361m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.10" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.19" }, { "model": "1/10gb uplink ethernet switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.8.22.0" }, { "model": "(comware r2432p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "59307)" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.10" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "api management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.6" }, { "model": "fortimanager", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.4" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.1.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "oncommand performance manager", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "project openssl 1.0.1e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "hsr6602 (comware r3303p28", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "ru r3303p28.ru", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "66025" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.15" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "fortiauthenticator", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "15.1" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.5" }, { "model": "project openssl 1.0.1a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "fortimanager", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.6" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.13" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.15" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "qradar incident forensics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.0" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1209" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.5" }, { "model": "9.3-release-p31", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "hp870 (comware r2607p51", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.0" }, { "model": "systems insight manager 7.3.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "msr (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "30-165)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.5.0.2" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4.19" }, { "model": "insight control server provisioning", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3361" }, { "model": "10.1-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "4500g (comware r2221p22", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.5.0.6" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "fortiswitch", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "mobile foundation consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.1" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3394" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.4.0.5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.3" }, { "model": "9.3-release-p22", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-rc1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.6.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.3" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.7" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.1.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.6.0.3" }, { "model": "openscape uc application", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "0" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.4" }, { "model": "msr (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "30-1x5)" }, { "model": "fortiadc", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.2.1" }, { "model": "(comware r2150", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "79007)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37001.1" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "5.0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "api management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "9.3-release-p10", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "qradar siem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.4" }, { "model": "opensuse evergreen", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.4" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.4" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.5" }, { "model": "mq light client module for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2014091001" }, { "model": "flashsystem 9843-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.1.8" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "g8264cs si fabric image", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "bigfix platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "smb (comware r1110", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "16205)" }, { "model": "project openssl 1.0.1g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.3" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "10.1" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "2.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "flashsystem 9848-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.4" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "system networking rackswitch g8264cs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50001.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.16" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.5" }, { "model": "qradar siem patch ifix01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.44" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.2" }, { "model": "qradar siem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "10.1-release-p17", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.4" }, { "model": "system networking rackswitch g8124", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.16.0" }, { "model": "mobile foundation enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.210" }, { "model": "project openssl 1.0.1i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.9" }, { "model": "fortimail", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "forticlient", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.3.091" }, { "model": "msr20 (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.913" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.8" }, { "model": "msr 50-g2 (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3.0.10" }, { "model": "infosphere master data management patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "ctpview 7.3r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "9.3-beta3-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.15" }, { "model": "system networking rackswitch g8052", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.11.6.0" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70007.6.0.4" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.5" }, { "model": "mq light client module for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2014090800" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.3" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.5.0" }, { "model": "mobilefirst platform foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "10.2-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4.19" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.6" }, { "model": "si (comware r1517", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "51205)" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "10.1-rc2-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "(comware r7180", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "105007)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3" }, { "model": "project openssl 1.0.2e", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "bigfix platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "rational clearquest", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.16" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "project openssl 1.0.1q", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "qlogic 8gb intelligent pass-thru module \u0026 san switch module for", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.10.1.38.00" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "icewall sso agent option", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2.0.3" }, { "model": "openscape common management port", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.3" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "security network controller 1.0.3350m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "1/10gb uplink ethernet switch module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.4.13.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "netezza platform software 7.2.0.4-p2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3.0.10" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4.1.8" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "(comware r7180", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "75007)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4.1.8" }, { "model": "system networking rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "oncommand report", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.213" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.12" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.4" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.17" }, { "model": "qlogic 8gb intelligent pass-thru module \u0026 san switch module for", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.10" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4.0.7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.13" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.1.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.3" }, { "model": "imc uam tam e0406", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.9" }, { "model": "bladesystem c-class virtual connect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.30" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4" }, { "model": "netezza platform software 7.1.0.8-p1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.4" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "8.0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "(comware r5319p15", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "36105)" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "bundle of g8264cs image", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.13.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.16" }, { "model": "fortisandbox", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "2.1" }, { "model": "openscape voice trace manage", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.28" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v50007.5.0.7" }, { "model": "msr2000 (comware r0306p12", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "vcx", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "bigfix remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.3" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4.0.7" }, { "model": "ei (comware r2221p22", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "51205)" }, { "model": "openscape desk phone ip hf r0.28", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v3" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1.8.01.00" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.5" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.1" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.7" }, { "model": "worklight consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "system networking rackswitch g8264t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.2" }, { "model": "1/10gb uplink ethernet switch module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.8.23.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.4.0.7" }, { "model": "proventia network enterprise scanner", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.06" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "1.0" }, { "model": "security network controller 1.0.3387m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "virtual fabric 10gb switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.8.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.2" }, { "model": "mobile foundation consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "9.3-rc", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.12" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v35007.4.0.9" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4.0.6" }, { "model": "security network controller 1.0.3379m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "9.3-beta1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2.0.8" }, { "model": "10.2-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.7" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.17" }, { "model": "10.1-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "6125xlg r2432p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.2" }, { "model": "10.1-release", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "systems insight manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "infosphere master data management provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.10" }, { "model": "bladesystem c-class virtual connect", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.50" }, { "model": "(comware r2432p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "59007)" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "hsr6800 (comware r7103p09", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "f5000-a (comware f3210p26", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1.0.6" }, { "model": "9.3-release-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "flex system fabric si4093 system interconnect module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.13.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4.0.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.8" }, { "model": "10.1-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-stable", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.8" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4.0.5" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.3" }, { "model": "sonas", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.4" }, { "model": "10.1-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.5.0.2" }, { "model": "si4093 image", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "imc inode e0407", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.34" }, { "model": "project openssl 1.0.1c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storwize 6.4storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3500v3700" }, { "model": "smartcloud entry appliance fixpac", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "system networking rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.21.0" }, { "model": "netezza platform software 7.1.0.4-p1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "openscape voice r1", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "system networking rackswitch g8124", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.5.0" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1768" }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "9.3-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.38" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "project openssl 1.0.1f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl 1.0.2a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "altavault", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "netezza platform software 7.2.0.4-p3", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4.0.8" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.4.1" }, { "model": "fortimanager", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.3" }, { "model": "10.2-rc1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.12" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.3.3" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70007.4.0.9" }, { "model": "netezza platform software 7.2.1.1-p1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.41" }, { "model": "smb1910 (comware r1113", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4.0.6" }, { "model": "netezza diagnostics tools", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.3.1.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3.0.10" }, { "model": "hi (comware r5501p21", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "55005)" }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.13.0" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "10.1-beta1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.0" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.3.4" }, { "model": "9.3-release-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "qradar incident forensics patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.53" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "virtual fabric 10gb switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.8.22.0" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.1.7" }, { "model": "worklight consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.2" }, { "model": "system networking rackswitch g8124", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3.0.10" }, { "model": "fortirecorder", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "2.0.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3.0.12" }, { "model": "mobilefirst platform foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.0" }, { "model": "comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "70" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" }, { "model": "msr (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9xx5)" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "system networking rackswitch g8264", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.11.6.0" }, { "model": "hp850 (comware r2607p51", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "project openssl 1.0.2d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "imc wsm e0502p04", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "6127xlg r2432p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "a6600 (comware r3303p28", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "(comware r1810p03", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "58005)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.6.3.2" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "moonshot r2432p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.3" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.8" }, { "model": "infinity", "scope": "ne", "trust": 0.3, "vendor": "pexip", "version": "11.1" }, { "model": "9.3-beta1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.31" }, { "model": "9.3-release-p25", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "fortirecorder", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "1.5" }, { "model": "flashsystem 9848-ac1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "flashsystem 9840-ae2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70007.5.0.7" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v37007.4.0.9" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.34" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.4" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.7" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.3" }, { "model": "openscape sbc r", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v7" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3387" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "mq light client module for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2014090300" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4.0.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.4" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v50007.4.0.9" }, { "model": "primavera p6 enterprise project portfolio management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "15.2" }, { "model": "10.2-beta2-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "netezza platform software 7.1.0.5-p3", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.6.1" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v37007.5.0.7" }, { "model": "security network controller 1.0.3352m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.14" }, { "model": "openscape alarm respons", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.14" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6.0.3" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.5.0.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.13" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4.0.7" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "forticlient", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.4.0650" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "san volume controller", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.7" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "4.0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.6" }, { "model": "project openssl 1.0.1n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4.0.5" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.0" }, { "model": "flashsystem 9846-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "project openssl 1.0.1o", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.5" }, { "model": "ei (comware r2221p22", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "55005)" }, { "model": "5510hi (comware r1120", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.3.1" }, { "model": "g8264cs si fabric image", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.13.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.16" }, { "model": "bladesystem c-class virtual connect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.45" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.17" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4.0.8" }, { "model": "10.1-beta3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.1" }, { "model": "msr1000 (comware r0306p12", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.3" }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10" }, { "model": "vsr (comware e0322p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "openscape r", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "4000v7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.5.0.3" }, { "model": "manageability sdk", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.13.0" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.0.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.18" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "flashsystem 9846-ac0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.7" }, { "model": "system networking rackswitch g8264cs", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.13.0" }, { "model": "wx5004-ei (comware r2507p44", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "10.1-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "system networking rackswitch g8052", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.16.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.15" }, { "model": "mq light client module for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2014111002" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4.19" }, { "model": "fortiap", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.13" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.1" }, { "model": "openscape r1", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "4000v7" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3.0.12" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.4.0.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2" }, { "model": "email gateway", "scope": "ne", "trust": 0.3, "vendor": "mcafee", "version": "7.6.404" }, { "model": "openscape sbc r", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v8" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.0" }, { "model": "9.3-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "4800g (comware r2221p22", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "(comware r3113p02", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "51307)" }, { "model": "9.3-release-p21", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smb1920 (comware r1112", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.1" }, { "model": "9.3-release-p24", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8" }, { "model": "1/10gb uplink ethernet switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4.12.0" }, { "model": "10.1-release-p19", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3.0.5" }, { "model": "openstage desk phone ip si r3.32", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.35" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.010" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "6.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.10" }, { "model": "smartcloud entry appliance fixpac", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "u200s and cs (comware f5123p33", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "9.3-release-p13", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.23" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "10.1-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "(comware r2432p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "57007)" }, { "model": "fortivoiceos", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4.19" }, { "model": "san volume controller", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.4.0.9" }, { "model": "fortisandbox", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "2.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "msr4000 (comware r0306p12", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "icewall sso dfw", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "hp6000 (comware r2507p44", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0" }, { "model": "(comware r1118p13", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "58305)" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.4" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "3.0" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.11" }, { "model": "netezza diagnostics tools", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.1.1" }, { "model": "fortisandbox", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "2.0.2" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v37007.6.0.4" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.9" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3" }, { "model": "intelligent management center", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "rse ru r3303p28.ru", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "66005" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "rpe ru r3303p28.ru", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "66005" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.6.0.3" }, { "model": "(comware r5213p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3100v25)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.6.0.3" }, { "model": "storwize unified", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.4" }, { "model": "mq light client module for node.js 1.0.2014091000-red", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.8" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.7" }, { "model": "9.3-rc2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.17" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v35007.6.0.4" }, { "model": "business process manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.6" }, { "model": "vcx", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9.8.19" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.5" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.5" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.4.0.8" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.21" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.4" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.1.3" }, { "model": "netezza platform software 7.1.0.5-p2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3" }, { "model": "qradar incident forensics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2" }, { "model": "flex system fc3171 8gb san switch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1.8.01.00" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.3" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "(comware r7377", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "125007)" }, { "model": "websphere mq for hp nonstop server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.11" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.10" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.3.5" }, { "model": "security network controller 1.0.3394m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network controller 1.0.3381m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.1" }, { "model": "comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "50" }, { "model": "system networking rackswitch g8124-e", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.11.6.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.37" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "9.3-rc1-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-rc4-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3.0.12" }, { "model": "imc plat e0403p04", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "flashsystem 9843-ae2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "qlogic virtual fabric extension module for ibm bladecenter", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.0.3.16.00" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.2.3" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.6.4" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.12" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.2.0.5" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "project openssl 1.0.1m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1.0.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.2" }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.6.3.1" }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.13.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.3.0.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.16" }, { "model": "10.1-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "forticlient", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.3.633" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.9" }, { "model": "openscape branch r", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "virtual fabric 10gb switch module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.8.23.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.3" }, { "model": "10.2-beta2-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2.0.3" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "(comware r1517p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "v19105)" }, { "model": "hp830 (comware r3507p51", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "rational clearquest", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.11" }, { "model": "msr (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "505)" }, { "model": "hsr6800 (comware r3303p28", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "puredata system for analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.13" }, { "model": "fortimanager", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.2" }, { "model": "forticlient ios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.1" }, { "model": "system networking rackswitch g8264t", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.16.0" }, { "model": "10.2-release-p8", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.41" }, { "model": "forticlient android", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.5.0.3" }, { "model": "project openssl 1.0.1j", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "si4093 image", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.13.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.17" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "9.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4.1.8" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.7" }, { "model": "version control repository manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.3" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "u200a and m (comware f5123p33", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "openscape desk phone ip si r3.32", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1.0.7" }, { "model": "system networking rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.5.0" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "flashsystem 9840-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.1" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.12" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.3.0.5" }, { "model": "project openssl 1.0.1d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "ctpview 7.1r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "hsr6602 ru r3303p28.ru", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.9" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "ctpview 7.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3381" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1.0.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1.0.7" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1.0.6" }, { "model": "(comware r1210p02", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "105005)" }, { "model": "system networking rackswitch g8332", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.7.22.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.5.0.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.2" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.1" }, { "model": "smartcloud entry appliance fixpac", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.12" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.5.0.3" }, { "model": "openscape voice r1", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v8" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.0" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.13" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.3" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.6.0.3" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "system networking rackswitch g8264", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.16.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.1" }, { "model": "fortianalyzer", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "worklight consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.1" }, { "model": "nj5000 r1107", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hsr6600 (comware r7103p09", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.5.0.3" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "system networking rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.15.0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.1.3" }, { "model": "hsr6800 ru r3303p28.ru", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5" }, { "model": "endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "bigfix platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.8" }, { "model": "tivoli netcool reporter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1" }, { "model": "(comware r1829p02", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "125005)" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1" }, { "model": "qlogic virtual fabric extension module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.3.1" }, { "model": "netezza platform software 7.2.0.7-p1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "insight control", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.4.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.4" }, { "model": "system networking rackswitch g8124", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.11.6.0" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3376" }, { "model": "qradar incident forensics patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.62" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.12" }, { "model": "server migration pack", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "10.2-stable", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "email gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.6.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.3" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "9.3-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "msr20-1x (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "msr3000 (comware r0306p12", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.3" }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.53" }, { "model": "project openssl 1.0.1k", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "9500e (comware r1829p02", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "fortidb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "5130hi (comware r1120", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7)" }, { "model": "5500si (comware r2221p22", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "flashsystem 9848-ac0", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "server migration pack", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "9.3-beta1-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.2" }, { "model": "project openssl 1.0.1b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.25" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.2" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "san volume controller", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.6.0.4" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.33" }, { "model": "openscape branch r1", "scope": "eq", "trust": 0.3, "vendor": "unify", "version": "v8" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.2.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.2" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.12" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "smartcloud entry appliance fixpac", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35001.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2.0.5" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "fortiadc", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.2" }, { "model": "qradar siem patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.43" }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.5.0.6" }, { "model": "infosphere master data management standard/advanced edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.4" }, { "model": "qradar siem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.3" }, { "model": "flashsystem 9846-ac1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v840" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50006.2" }, { "model": "msr (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "93x5)" }, { "model": "rational clearquest", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.18" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1.1" }, { "model": "websphere mq advanced message security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-8.0.0.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.11" }, { "model": "10.1-release-p23", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.1.4" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "bundle of g8264cs image", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "10.1-release-p16", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.11" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v35007.5.0.7" }, { "model": "fortiap", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.8" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.5" }, { "model": "ctpview 7.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "9.3-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "(comware r3113p02", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "19507)" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3.0.12" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35006.3" }, { "model": "9.3-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.1.0.7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.12" }, { "model": "forticache", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "project openssl 1.0.2c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "fortiadc", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2" }, { "model": "(comware r6710p02", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "75005)" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4.0.7" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37006.3" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.9" }, { "model": "fortiwan", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "mq light client module for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2014090801" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.4" }, { "model": "security network controller 1.0.3376m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "oncommand unified manager for clustered data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "6.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "(comware r2111p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3600v25)" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3379" }, { "model": "fortimanager", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "(comware r1150", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "129007)" }, { "model": "matrix operating environment", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "websphere mq for hp nonstop server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.10" }, { "model": "msr (comware r2516", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "305)" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "project openssl 1.0.2b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0" }, { "model": "10.1-release-p25", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "fortirecorder", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "1.4.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "mobilefirst platform foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.0" }, { "model": "mobile foundation enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.1" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.14" }, { "model": "flex system chassis management module 2pet", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.4.0.6" }, { "model": "tealeaf customer experience", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1.0.7" }, { "model": "qradar incident forensics patch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.41" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.5.0.2" }, { "model": "fortiddos", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.8" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.10" }, { "model": "xcode", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "8.1" }, { "model": "sonas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.1.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.0" }, { "model": "system networking rackswitch g8316", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.16.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "flex system fabric si4093 system interconnect module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.12.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.1.0.6" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.1" }, { "model": "fortisandbox", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "2.0.3" }, { "model": "secblade fw (comware r3181p07", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "4210g (comware r2221p22", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5)" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.32" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.7" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.5.0" }, { "model": "systems insight manager 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "6125g/xg blade switch r2112p05", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v35007.2.0.8" }, { "model": "project openssl 1.0.1l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.4.0.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v37007.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.4.0.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v50007.3.0.5" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "9.3-release-p29", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.3.2" }, { "model": "system networking rackswitch g8124-e", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.9.16.0" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2.0.8" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.4" }, { "model": "rational requisitepro", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.18" }, { "model": "infinity", "scope": "eq", "trust": 0.3, "vendor": "pexip", "version": "7.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "oncommand unified manager host package", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "storwize", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v50007.6.0.4" }, { "model": "project openssl 1.0.1h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "10.2-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.9" }, { "model": "project openssl 1.0.1p", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "virtual fabric 10gb switch module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.8.9.0" } ], "sources": [ { "db": "BID", "id": "78623" }, { "db": "NVD", "id": "CVE-2015-3194" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "135394" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "137201" }, { "db": "PACKETSTORM", "id": "136992" } ], "trust": 0.4 }, "cve": "CVE-2015-3194", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2015-3194", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2015-3194", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-3194", "trust": 1.0, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-3194", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-3194" }, { "db": "NVD", "id": "CVE-2015-3194" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter. OpenSSL is prone to denial-of-service vulnerability. \nAn attacker may exploit this issue to crash the affected application; denying service to legitimate users. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2016-10-27-1 Xcode 8.1\n\nXcode 8.1 is now available and addresses the following:\n\nIDE Xcode Server\nAvailable for: OS X El Capitan v10.11.5 and later\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: Multiple issues existed in Node.js in Xcode Server. \nThese issues were addressed by updating to Node.js version 4.5.0. \nCVE-2016-1669\nCVE-2016-0705\nCVE-2016-0797\nCVE-2016-0702\nCVE-2016-2086\nCVE-2016-2216\nCVE-2015-8027\nCVE-2015-3193\nCVE-2015-3194\nCVE-2015-6764\n\nXcode 8.1 may be obtained from:\n\nhttps://developer.apple.com/xcode/downloads/\n\nTo check that the Xcode has been updated:\n\n* Select Xcode in the menu bar\n* Select About Xcode\n* The version after applying this update will be \"8.1\". -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2018-10-30-9 Additional information for\nAPPLE-SA-2018-9-24-1 macOS Mojave 10.14\n\nmacOS Mojave 10.14 addresses the following:\n\nBluetooth\nAvailable for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012)\n, iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac\n(Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015),\nMac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012)\n, Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro\n(Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air\n(13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air\n(13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air\n(13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air\n(13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro\n(15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013),\nMacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina,\n13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013)\nImpact: An attacker in a privileged network position may be able to\nintercept Bluetooth traffic\nDescription: An input validation issue existed in Bluetooth. This\nissue was addressed with improved input validation. \nCVE-2018-5383: Lior Neumann and Eli Biham\n\nThe updates below are available for these Mac models:\nMacBook (Early 2015 and later), MacBook Air (Mid 2012 and later),\nMacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later),\niMac (Late 2012 and later), iMac Pro (all models), Mac Pro\n(Late 2013, Mid 2010, and Mid 2012 models with recommended\nMetal-capable graphics processor, including MSI Gaming Radeon RX 560\nand Sapphire Radeon PULSE RX 580)\n\nafpserver\nImpact: A remote attacker may be able to attack AFP servers through\nHTTP clients\nDescription: An input validation issue was addressed with improved\ninput validation. \nCVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC\nBerkeley\nEntry added October 30, 2018\n\nApp Store\nImpact: A malicious application may be able to determine the Apple ID\nof the owner of the computer\nDescription: A permissions issue existed in the handling of the Apple\nID. This issue was addressed with improved access controls. \nCVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc. \n\nAppleGraphicsControl\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4417: Lee of the Information Security Lab Yonsei University\nworking with Trend Micro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nApplication Firewall\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A configuration issue was addressed with additional\nrestrictions. \nCVE-2018-4353: Abhinav Bansal of LinkedIn Inc. \n\nAPR\nImpact: Multiple buffer overflow issues existed in Perl\nDescription: Multiple issues in Perl were addressed with improved\nmemory handling. \nCVE-2017-12613: Craig Young of Tripwire VERT\nCVE-2017-12618: Craig Young of Tripwire VERT\nEntry added October 30, 2018\n\nATS\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend\nMicro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nATS\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4308: Mohamed Ghannam (@_simo36)\nEntry added October 30, 2018\n\nAuto Unlock\nImpact: A malicious application may be able to access local users\nAppleIDs\nDescription: A validation issue existed in the entitlement\nverification. This issue was addressed with improved validation of\nthe process entitlement. \nCVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc. \n\nCFNetwork\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nCoreFoundation\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4412: The UK\u0027s National Cyber Security Centre (NCSC)\nEntry added October 30, 2018\n\nCoreFoundation\nImpact: An application may be able to gain elevated privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4414: The UK\u0027s National Cyber Security Centre (NCSC)\nEntry added October 30, 2018\n\nCoreText\nImpact: Processing a maliciously crafted text file may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2018-4347: an anonymous researcher\nEntry added October 30, 2018\n\nCrash Reporter\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4333: Brandon Azad\n\nCUPS\nImpact: In certain configurations, a remote attacker may be able to\nreplace the message content from the print server with arbitrary\ncontent\nDescription: An injection issue was addressed with improved\nvalidation. \nCVE-2018-4153: Michael Hanselmann of hansmi.ch\nEntry added October 30, 2018\n\nCUPS\nImpact: An attacker in a privileged position may be able to perform a\ndenial of service attack\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4406: Michael Hanselmann of hansmi.ch\nEntry added October 30, 2018\n\nDictionary\nImpact: Parsing a maliciously crafted dictionary file may lead to\ndisclosure of user information\nDescription: A validation issue existed which allowed local file\naccess. This was addressed with input sanitization. \nCVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing\nEntry added October 30, 2018\n\nGrand Central Dispatch\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4426: Brandon Azad\nEntry added October 30, 2018\n\nHeimdal\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4331: Brandon Azad\nCVE-2018-4332: Brandon Azad\nCVE-2018-4343: Brandon Azad\nEntry added October 30, 2018\n\nHypervisor\nImpact: Systems with microprocessors utilizing speculative execution\nand address translations may allow unauthorized disclosure of\ninformation residing in the L1 data cache to an attacker with local\nuser access with guest OS privilege via a terminal page fault and a\nside-channel analysis\nDescription: An information disclosure issue was addressed by\nflushing the L1 data cache at the virtual machine entry. \nCVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas\nF. Wenisch of University of Michigan, Mark Silberstein and Marina\nMinkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens\nof KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu\nof Intel Corporation, Yuval Yarom of The University of Adelaide\nEntry added October 30, 2018\n\niBooks\nImpact: Parsing a maliciously crafted iBooks file may lead to\ndisclosure of user information\nDescription: A configuration issue was addressed with additional\nrestrictions. \nCVE-2018-4355: evi1m0 of bilibili security team\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4396: Yu Wang of Didi Research America\nCVE-2018-4418: Yu Wang of Didi Research America\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to read restricted memory\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2018-4351: Appology Team @ Theori working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4350: Yu Wang of Didi Research America\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4334: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOHIDFamily\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation\nCVE-2018-4408: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOKit\nImpact: A malicious application may be able to break out of its\nsandbox\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4341: Ian Beer of Google Project Zero\nCVE-2018-4354: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOKit\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2018-4383: Apple\nEntry added October 30, 2018\n\nIOUserEthernet\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4401: Apple\nEntry added October 30, 2018\n\nKernel\nImpact: A malicious application may be able to leak sensitive user\ninformation\nDescription: An access issue existed with privileged API calls. This\nissue was addressed with additional restrictions. \nCVE-2018-4399: Fabiano Anemone (@anoane)\nEntry added October 30, 2018\n\nKernel\nImpact: An attacker in a privileged network position may be able to\nexecute arbitrary code\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2018-4407: Kevin Backhouse of Semmle Ltd. \nEntry added October 30, 2018\n\nKernel\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4336: Brandon Azad\nCVE-2018-4337: Ian Beer of Google Project Zero\nCVE-2018-4340: Mohamed Ghannam (@_simo36)\nCVE-2018-4344: The UK\u0027s National Cyber Security Centre (NCSC)\nCVE-2018-4425: cc working with Trend Micro\u0027s Zero Day Initiative,\nJuwei Lin (@panicaII) of Trend Micro working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nLibreSSL\nImpact: Multiple issues in libressl were addressed in this update\nDescription: Multiple issues were addressed by updating to libressl\nversion 2.6.4. \nCVE-2015-3194\nCVE-2015-5333\nCVE-2015-5334\nCVE-2016-702\nEntry added October 30, 2018\n\nLogin Window\nImpact: A local user may be able to cause a denial of service\nDescription: A validation issue was addressed with improved logic. \nCVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of\nMWR InfoSecurity\nEntry added October 30, 2018\n\nmDNSOffloadUserClient\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4326: an anonymous researcher working with Trend Micro\u0027s\nZero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team\nEntry added October 30, 2018\n\nMediaRemote\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: An access issue was addressed with additional sandbox\nrestrictions. \nCVE-2018-4310: CodeColorist of Ant-Financial LightYear Labs\nEntry added October 30, 2018\n\nMicrocode\nImpact: Systems with microprocessors utilizing speculative execution\nand speculative execution of memory reads before the addresses of all\nprior memory writes are known may allow unauthorized disclosure of\ninformation to an attacker with local user access via a side-channel\nanalysis\nDescription: An information disclosure issue was addressed with a\nmicrocode update. This ensures that older data read from\nrecently-written-to addresses cannot be read via a speculative\nside-channel. \nCVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken\nJohnson of the Microsoft Security Response Center (MSRC)\nEntry added October 30, 2018\n\nSecurity\nImpact: A local user may be able to cause a denial of service\nDescription: This issue was addressed with improved checks. \nCVE-2018-4395: Patrick Wardle of Digita Security\nEntry added October 30, 2018\n\nSecurity\nImpact: An attacker may be able to exploit weaknesses in the RC4\ncryptographic algorithm\nDescription: This issue was addressed by removing RC4. \nCVE-2016-1777: Pepi Zawodsky\n\nSpotlight\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4393: Lufeng Li\nEntry added October 30, 2018\n\nSymptom Framework\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nText\nImpact: Processing a maliciously crafted text file may lead to a\ndenial of service\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4304: jianan.huang (@Sevck)\nEntry added October 30, 2018\n\nWi-Fi\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend\nMicro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nAdditional recognition\n\nAccessibility Framework\nWe would like to acknowledge Ryan Govostes for their assistance. \n\nCore Data\nWe would like to acknowledge Andreas Kurtz (@aykay) of NESO Security\nLabs GmbH for their assistance. \n\nCoreDAV\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nCoreGraphics\nWe would like to acknowledge Nitin Arya of Roblox Corporation for\ntheir assistance. \n\nCoreSymbolication\nWe would like to acknowledge Brandon Azad for their assistance. \n\nIOUSBHostFamily\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nKernel\nWe would like to acknowledge Brandon Azad for their assistance. \n\nMail\nWe would like to acknowledge Alessandro Avagliano of Rocket Internet\nSE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron\nSoftware Systems, and Zbyszek A\u003e\u003eA3Akiewski for their assistance. \n\nQuick Look\nWe would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing\nand Patrick Wardle of Digita Security and lokihardt of Google Project\nZero for their assistance. \n\nSecurity\nWe would like to acknowledge Christoph Sinai, Daniel Dudek\n(@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak)\nof ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of\nShapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson\nDing, and an anonymous researcher for their assistance. \n\nSQLite\nWe would like to acknowledge Andreas Kurtz (@aykay) of NESO Security\nLabs GmbH for their assistance. \n\nTerminal\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nWindowServer\nWe would like to acknowledge Patrick Wardle of Digita Security for\ntheir assistance. \n\nInstallation note:\n\nmacOS Mojave 10.14 may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\n1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k=\n=i9YR\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n\na-c04944173\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04944173\nVersion: 1\n\nHPSBGN03536 rev.1 - HP IceWall Products running OpenSSL, Remote and Local\nDenial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2016-01-22\nLast Updated: 2016-01-22\n\nPotential Security Impact: Denial of Service (DoS), Remote Denial of Service\n(DoS)\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nSecurity vulnerabilities in the OpenSSL library could potentially impact HPE\nIceWall products resulting in local or remote Denial of Service (DoS). \n\nReferences:\n\n - CVE-2015-3194 (Certificate verify crash with missing PSS parameter)\n - CVE-2015-3195 (X509_ATTRIBUTE memory leak)\n - CVE-2015-3196 (Certificate verify crash with missing PSS parameter)\n - PSRT110014\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n Product\n Impacted CVEs\n\n IceWall MCRP 3.0\n CVE-2015-3195\n\n IceWall MCRP 3.0 (HP-UX only)\n CVE-2015-3196\n\n IceWall SSO Agent Option 10.0\n CVE-2015-3194, CVE-2015-3195\n\n IceWall SSO Agent Option 10.0 (RHEL7 or HP-UX only)\n CVE-2015-3196\n\n IceWall SSO Certd 10.0\n CVE-2015-3196\n\n IceWall SSO Dfw 10.0\n CVE-2015-3194, CVE-2015-3195\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-3194 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2015-3195 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2015-3196 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHPE recommends applying the latest OS vendor security patches for OpenSSL to\nresolve the vulnerabilities for HP IceWall Products. \n\nHP IceWall SSO Dfw 10.0 and Certd 10.0, which are running on RHEL, could be\nusing either the OS bundled OpenSSL library or the OpenSSL bundled with HP\nIceWall. If still using the OpenSSL bundled with HP IceWall, please apply the\nlatest OS vendor security patches for OpenSSL and switch to the OpenSSL\nlibrary bundled with the OS. \n\nDocuments are available at the following location with instructions to switch\nto the OS bundled OpenSSL library:\n\n \u003chttp://www.hp.com/jp/icewall_patchaccess\u003e\n\nPlease note that the HP IceWall product is only available in Japan. \n\nHISTORY\nVersion:1 (rev.1) - 22 January 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability with any HPE supported\nproduct, send Email to: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. The vulnerabilities could\nbe exploited remotely resulting in Denial of Service (DoS), execution of\narbitrary code, disclosure of information, Cross-site Request Forgery (CSRF),\nand Cross-site scripting (XSS). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release\nAdvisory ID: RHSA-2016:2957-01\nProduct: Red Hat JBoss Core Services\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-2957.html\nIssue date: 2016-12-15\nCVE Names: CVE-2012-1148 CVE-2014-3523 CVE-2014-8176 \n CVE-2015-0209 CVE-2015-0286 CVE-2015-3185 \n CVE-2015-3194 CVE-2015-3195 CVE-2015-3196 \n CVE-2015-3216 CVE-2016-0702 CVE-2016-0705 \n CVE-2016-0797 CVE-2016-0799 CVE-2016-1762 \n CVE-2016-1833 CVE-2016-1834 CVE-2016-1835 \n CVE-2016-1836 CVE-2016-1837 CVE-2016-1838 \n CVE-2016-1839 CVE-2016-1840 CVE-2016-2105 \n CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 \n CVE-2016-2109 CVE-2016-2177 CVE-2016-2178 \n CVE-2016-2842 CVE-2016-3627 CVE-2016-3705 \n CVE-2016-4447 CVE-2016-4448 CVE-2016-4449 \n CVE-2016-4459 CVE-2016-4483 CVE-2016-5419 \n CVE-2016-5420 CVE-2016-6808 CVE-2016-7141 \n CVE-2016-8612 \n=====================================================================\n\n1. Summary:\n\nRed Hat JBoss Core Services httpd 2.4.23 is now available from the Red Hat\nCustomer Portal for Solaris and Microsoft Windows systems. \n\nRed Hat Product Security has rated this release as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Description:\n\nThis release of Red Hat JBoss Core Services httpd 2.4.23 serves as a\nreplacement for JBoss Core Services Apache HTTP Server 2.4.6. \n\nSecurity Fix(es):\n\n* This update fixes several flaws in OpenSSL. (CVE-2014-8176,\nCVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196,\nCVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799,\nCVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109,\nCVE-2016-2177, CVE-2016-2178, CVE-2016-2842)\n\n* This update fixes several flaws in libxml2. (CVE-2016-1762,\nCVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837,\nCVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705,\nCVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)\n\n* This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420,\nCVE-2016-7141)\n\n* This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)\n\n* This update fixes two flaws in mod_cluster. (CVE-2016-4459,\nCVE-2016-8612)\n\n* A buffer overflow flaw when concatenating virtual host names and URIs was\nfixed in mod_jk. (CVE-2016-6808)\n\n* A memory leak flaw was fixed in expat. (CVE-2012-1148)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-8176, CVE-2015-0286, CVE-2016-2108, CVE-2016-2105, CVE-2016-2106,\nCVE-2016-2107, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799,\nand CVE-2016-2842. The CVE-2016-4459 issue was discovered by Robert Bost\n(Red Hat). Upstream acknowledges Stephen Henson (OpenSSL development team)\nas the original reporter of CVE-2015-0286; Huzaifa Sidhpurwala (Red Hat),\nHanno BAPck, and David Benjamin (Google) as the original reporters of\nCVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2105,\nCVE-2016-2106, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842; Juraj\nSomorovsky as the original reporter of CVE-2016-2107; Yuval Yarom\n(University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv\nUniversity), and Nadia Heninger (University of Pennsylvania) as the\noriginal reporters of CVE-2016-0702; and Adam Langley (Google/BoringSSL) as\nthe original reporter of CVE-2016-0705. \n\nSee the corresponding CVE pages linked to in the References section for\nmore information about each of the flaws listed in this advisory. \n\n3. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files). \n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically. \n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n801648 - CVE-2012-1148 expat: Memory leak in poolGrow\n1121519 - CVE-2014-3523 httpd: WinNT MPM denial of service\n1196737 - CVE-2015-0209 openssl: use-after-free on invalid EC private key import\n1202366 - CVE-2015-0286 openssl: invalid pointer use in ASN1_TYPE_cmp()\n1227574 - CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression\n1228611 - CVE-2014-8176 OpenSSL: Invalid free in DTLS\n1243888 - CVE-2015-3185 httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4\n1288320 - CVE-2015-3194 OpenSSL: Certificate verify crash with missing PSS parameter\n1288322 - CVE-2015-3195 OpenSSL: X509_ATTRIBUTE memory leak\n1288326 - CVE-2015-3196 OpenSSL: Race condition handling PSK identify hint\n1310596 - CVE-2016-0705 OpenSSL: Double-free in DSA code\n1310599 - CVE-2016-0702 OpenSSL: Side channel attack on modular exponentiation\n1311880 - CVE-2016-0797 OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption\n1312219 - CVE-2016-0799 OpenSSL: Fix memory issues in BIO_*printf functions\n1314757 - CVE-2016-2842 openssl: doapr_outch function does not verify that certain memory allocation succeeds\n1319829 - CVE-2016-3627 libxml2: stack exhaustion while parsing xml files in recovery mode\n1330101 - CVE-2016-2109 openssl: ASN.1 BIO handling of large amounts of data\n1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder\n1331426 - CVE-2016-2107 openssl: Padding oracle in AES-NI CBC MAC check\n1331441 - CVE-2016-2105 openssl: EVP_EncodeUpdate overflow\n1331536 - CVE-2016-2106 openssl: EVP_EncryptUpdate overflow\n1332443 - CVE-2016-3705 libxml2: stack overflow before detecting invalid XML file\n1332820 - CVE-2016-4483 libxml2: out-of-bounds read\n1338682 - CVE-2016-1833 libxml2: Heap-based buffer overread in htmlCurrentChar\n1338686 - CVE-2016-4447 libxml2: Heap-based buffer underreads due to xmlParseName\n1338691 - CVE-2016-1835 libxml2: Heap use-after-free in xmlSAX2AttributeNs\n1338696 - CVE-2016-1837 libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral\n1338700 - CVE-2016-4448 libxml2: Format string vulnerability\n1338701 - CVE-2016-4449 libxml2: Inappropriate fetch of entities content\n1338702 - CVE-2016-1836 libxml2: Heap use-after-free in xmlDictComputeFastKey\n1338703 - CVE-2016-1839 libxml2: Heap-based buffer overread in xmlDictAddString\n1338705 - CVE-2016-1838 libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal\n1338706 - CVE-2016-1840 libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup\n1338708 - CVE-2016-1834 libxml2: Heap-buffer-overflow in xmlStrncat\n1338711 - CVE-2016-1762 libxml2: Heap-based buffer-overread in xmlNextChar\n1341583 - CVE-2016-4459 mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute\n1341705 - CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase\n1343400 - CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation\n1362183 - CVE-2016-5419 curl: TLS session resumption client cert bypass\n1362190 - CVE-2016-5420 curl: Re-using connection with wrong client cert\n1373229 - CVE-2016-7141 curl: Incorrect reuse of client certificates\n1382352 - CVE-2016-6808 mod_jk: Buffer overflow when concatenating virtual host name and URI\n1387605 - CVE-2016-8612 JBCS mod_cluster: Protocol parsing logic error\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nJBCS-50 - CVE-2012-1148 CVE-2012-0876 expat: various flaws [jbews-3.0.0]\nJBCS-95 - CVE-2014-3523 httpd: WinNT MPM denial of service\n\n6. References:\n\nhttps://access.redhat.com/security/cve/CVE-2012-1148\nhttps://access.redhat.com/security/cve/CVE-2014-3523\nhttps://access.redhat.com/security/cve/CVE-2014-8176\nhttps://access.redhat.com/security/cve/CVE-2015-0209\nhttps://access.redhat.com/security/cve/CVE-2015-0286\nhttps://access.redhat.com/security/cve/CVE-2015-3185\nhttps://access.redhat.com/security/cve/CVE-2015-3194\nhttps://access.redhat.com/security/cve/CVE-2015-3195\nhttps://access.redhat.com/security/cve/CVE-2015-3196\nhttps://access.redhat.com/security/cve/CVE-2015-3216\nhttps://access.redhat.com/security/cve/CVE-2016-0702\nhttps://access.redhat.com/security/cve/CVE-2016-0705\nhttps://access.redhat.com/security/cve/CVE-2016-0797\nhttps://access.redhat.com/security/cve/CVE-2016-0799\nhttps://access.redhat.com/security/cve/CVE-2016-1762\nhttps://access.redhat.com/security/cve/CVE-2016-1833\nhttps://access.redhat.com/security/cve/CVE-2016-1834\nhttps://access.redhat.com/security/cve/CVE-2016-1835\nhttps://access.redhat.com/security/cve/CVE-2016-1836\nhttps://access.redhat.com/security/cve/CVE-2016-1837\nhttps://access.redhat.com/security/cve/CVE-2016-1838\nhttps://access.redhat.com/security/cve/CVE-2016-1839\nhttps://access.redhat.com/security/cve/CVE-2016-1840\nhttps://access.redhat.com/security/cve/CVE-2016-2105\nhttps://access.redhat.com/security/cve/CVE-2016-2106\nhttps://access.redhat.com/security/cve/CVE-2016-2107\nhttps://access.redhat.com/security/cve/CVE-2016-2108\nhttps://access.redhat.com/security/cve/CVE-2016-2109\nhttps://access.redhat.com/security/cve/CVE-2016-2177\nhttps://access.redhat.com/security/cve/CVE-2016-2178\nhttps://access.redhat.com/security/cve/CVE-2016-2842\nhttps://access.redhat.com/security/cve/CVE-2016-3627\nhttps://access.redhat.com/security/cve/CVE-2016-3705\nhttps://access.redhat.com/security/cve/CVE-2016-4447\nhttps://access.redhat.com/security/cve/CVE-2016-4448\nhttps://access.redhat.com/security/cve/CVE-2016-4449\nhttps://access.redhat.com/security/cve/CVE-2016-4459\nhttps://access.redhat.com/security/cve/CVE-2016-4483\nhttps://access.redhat.com/security/cve/CVE-2016-5419\nhttps://access.redhat.com/security/cve/CVE-2016-5420\nhttps://access.redhat.com/security/cve/CVE-2016-6808\nhttps://access.redhat.com/security/cve/CVE-2016-7141\nhttps://access.redhat.com/security/cve/CVE-2016-8612\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=distributions\u0026version=2.4.23\nhttps://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/\n\n7. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFYUxXtXlSAg2UNWIIRAm8yAKCDdIPhumydPcD3R7BVWXFnyHP/ZwCeJtAh\nOqjNSGx5/peirmVPrdVKUYE=\n=TZLU\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3413-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nDecember 04, 2015 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : openssl\nCVE ID : CVE-2015-3194 CVE-2015-3195 CVE-2015-3196\n\nMultiple vulnerabilities have been discovered in OpenSSL, a Secure\nSockets Layer toolkit. \n\nCVE-2015-3195\n\n Adam Langley of Google/BoringSSL discovered that OpenSSL will leak\n memory when presented with a malformed X509_ATTRIBUTE structure. \n\nCVE-2015-3196\n\n A race condition flaw in the handling of PSK identify hints was\n discovered, potentially leading to a double free of the identify\n hint data. \n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 1.0.1e-2+deb7u18. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.0.1k-3+deb8u2. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.2e-1 or earlier. \n\nWe recommend that you upgrade your openssl packages", "sources": [ { "db": "NVD", "id": "CVE-2015-3194" }, { "db": "BID", "id": "78623" }, { "db": "VULMON", "id": "CVE-2015-3194" }, { "db": "PACKETSTORM", "id": "139380" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "135394" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "137201" }, { "db": "PACKETSTORM", "id": "136992" }, { "db": "PACKETSTORM", "id": "140182" }, { "db": "PACKETSTORM", "id": "134632" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-3194", "trust": 2.2 }, { "db": "BID", "id": "78623", "trust": 1.4 }, { "db": "JUNIPER", "id": "JSA10761", "trust": 1.4 }, { "db": "BID", "id": "91787", "trust": 1.1 }, { "db": "PULSESECURE", "id": "SA40100", "trust": 1.1 }, { "db": "SIEMENS", "id": "SSA-412672", "trust": 1.1 }, { "db": "SECTRACK", "id": "1034294", "trust": 1.1 }, { "db": "JUNIPER", "id": "JSA10759", "trust": 1.1 }, { "db": "MCAFEE", "id": "SB10203", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-22-349-21", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-3194", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "139380", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150116", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135394", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137292", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137201", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136992", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "140182", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134632", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-3194" }, { "db": "BID", "id": "78623" }, { "db": "PACKETSTORM", "id": "139380" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "135394" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "137201" }, { "db": "PACKETSTORM", "id": "136992" }, { "db": "PACKETSTORM", "id": "140182" }, { "db": "PACKETSTORM", "id": "134632" }, { "db": "NVD", "id": "CVE-2015-3194" } ] }, "id": "VAR-201512-0483", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.419351 }, "last_update_date": "2024-09-19T00:47:17.851000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Red Hat: Moderate: openssl security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20152617 - Security Advisory" }, { "title": "Debian Security Advisories: DSA-3413-1 openssl -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=82bedc073c0f22b408ebaf092ed8621c" }, { "title": "Red Hat: CVE-2015-3194", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2015-3194" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2830-1" }, { "title": "Amazon Linux AMI: ALAS-2015-614", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2015-614" }, { "title": "Tenable Security Advisories: [R7] OpenSSL \u002720151203\u0027 Advisory Affects Tenable SecurityCenter", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2016-01" }, { "title": "Forcepoint Security Advisories: CVE-2015-3194, 3195, 3196 -- Security Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories\u0026qid=62ab21cc073446940abce12c35db3049" }, { "title": "Cisco: Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20151204-openssl" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20162957 - Security Advisory" }, { "title": "Symantec Security Advisories: SA105 : OpenSSL Vulnerabilities 3-Dec-2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=a924415f718a299b2d1e8046890941f3" }, { "title": "Debian CVElist Bug Report Logs: Security fixes from the April 2016 CPU", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=6bed8fb34e63f7953d08e5701d75ec01" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=435ed9abc2fb1e74ce2a69605a01e326" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=523d3f220a64ff01dd95e064bd37566a" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=eb439566c9130adc92d21bc093204cf8" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=122319027ae43d6d626710f1b1bb1d43" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=3a04485ebb79f7fbc2472bf9af5ce489" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2015-3194 " }, { "title": "changelog", "trust": 0.1, "url": "https://github.com/halon/changelog " } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-3194" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2015-3194" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.4, "url": "http://www.fortiguard.com/advisory/openssl-advisory-december-2015" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 1.4, "url": "http://openssl.org/news/secadv/20151203.txt" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2016-2957.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" }, { "trust": 1.1, "url": "http://www.debian.org/security/2015/dsa-3413" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-december/173801.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" }, { "trust": 1.1, "url": "http://fortiguard.com/advisory/openssl-advisory-december-2015" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/78623" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04944173" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/91787" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05131085" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05111017" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05157667" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=145382583417444\u0026w=2" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "trust": 1.1, "url": "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40100" }, { "trust": 1.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "trust": 1.1, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151204-openssl" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-2617.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2830-1" }, { "trust": 1.1, "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.754583" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" }, { "trust": 1.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10759" }, { "trust": 1.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10761" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05398322" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034294" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "trust": 1.1, "url": "https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=c394a488942387246653833359a5c94b5832674e" }, { "trust": 1.1, "url": "https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=d8541d7e9e63bf5f343af24644046c8d96498c17" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3194" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3195" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0705" }, { "trust": 0.4, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n" }, { "trust": 0.4, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.4, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0799" }, { "trust": 0.3, "url": "https://kb.netapp.com/support/index?page=content\u0026id=9010051\u0026actp=rss" }, { "trust": 0.3, "url": "http://openssl.org/" }, { "trust": 0.3, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10761\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "http://prod.lists.apple.com/archives/security-announce/2016/oct/msg00005.html" }, { "trust": 0.3, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10203" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/dec/23" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05398322" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04944173" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085 " }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05157667" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023836" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023987" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099196" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099199" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099200" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099210" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099426" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21981021" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021091" }, { "trust": 0.3, "url": "https://www.pexip.com/sites/pexip/files/pexip_security_bulletin_2016-02-17.pdf" }, { "trust": 0.3, "url": "https://networks.unify.com/security/advisories/obso-1512-02.pdf" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21979528" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg2c1000128" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21978415" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21979761" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005656" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005657" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005669" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005694" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005702" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974168" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974459" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21976148" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21976419" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21977265" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21978085" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21978238" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21978239" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979086" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980207" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980965" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980969" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21981765" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982172" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982877" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982883" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983532" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21984021" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21985739" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986593" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg2c1000058" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory15.asc" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983823" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982347" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3196" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6565" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0797" }, { "trust": 0.2, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0702" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1790" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1788" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1792" }, { "trust": 0.2, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3567" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3513" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1789" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1791" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7501" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2017" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0205" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3568" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3508" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3569" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3509" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3511" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2015-3194" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2015:2617" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2830-1/" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=42530" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2086" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8027" }, { "trust": 0.1, "url": "https://developer.apple.com/xcode/downloads/" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2216" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3193" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6764" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1669" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12618" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4336" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4338" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4308" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4332" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4326" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4153" }, { "trust": 0.1, "url": "https://support.apple.com/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4304" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4126" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4324" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4331" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4310" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1777" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4341" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3646" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4321" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4337" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12613" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3639" }, { "trust": 0.1, "url": "http://www.hp.com/jp/icewall_patchaccess\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7995" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-6750" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8035" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3237" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0728" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7547" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4969" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958" }, { "trust": 0.1, "url": "http://www.hpe.com/info/insightcontrol" }, { "trust": 0.1, "url": "http://www.hpe.com/info/insightmanagement" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2019" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2020" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2018" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2022" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2027" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3555" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2026" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2021" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2842" }, { "trust": 0.1, "url": "https://www.hp.com/go/hpsim" }, { "trust": 0.1, "url": "https://issues.jboss.org/):" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2107" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2106" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0705" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-3196" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4448" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3216" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2106" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0702" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-8176" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6808" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1835" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-3705" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1838" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2107" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1839" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3523" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2177" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4483" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3523" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2842" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8612" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1148" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1840" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0797" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3185" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2109" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1836" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-3185" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-3194" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1833" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.apachehttp\u0026downloadtype=distributions\u0026version=2.4.23" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2105" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8176" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1840" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1836" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1762" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1835" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4449" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-0286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1762" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-5420" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2178" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2108" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0286" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-3627" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2012-1148" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1837" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2109" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-1834" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0209" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1837" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1839" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-5419" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4459" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2108" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-0209" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-3195" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-3216" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1838" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1833" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2105" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1834" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4447" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-7141" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0799" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-3194" }, { "db": "BID", "id": "78623" }, { "db": "PACKETSTORM", "id": "139380" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "135394" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "137201" }, { "db": "PACKETSTORM", "id": "136992" }, { "db": "PACKETSTORM", "id": "140182" }, { "db": "PACKETSTORM", "id": "134632" }, { "db": "NVD", "id": "CVE-2015-3194" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2015-3194" }, { "db": "BID", "id": "78623" }, { "db": "PACKETSTORM", "id": "139380" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "135394" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "137201" }, { "db": "PACKETSTORM", "id": "136992" }, { "db": "PACKETSTORM", "id": "140182" }, { "db": "PACKETSTORM", "id": "134632" }, { "db": "NVD", "id": "CVE-2015-3194" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-06T00:00:00", "db": "VULMON", "id": "CVE-2015-3194" }, { "date": "2015-12-03T00:00:00", "db": "BID", "id": "78623" }, { "date": "2016-10-28T12:22:22", "db": "PACKETSTORM", "id": "139380" }, { "date": "2018-10-31T16:10:50", "db": "PACKETSTORM", "id": "150116" }, { "date": "2016-01-26T17:25:00", "db": "PACKETSTORM", "id": "135394" }, { "date": "2016-06-02T19:12:12", "db": "PACKETSTORM", "id": "137292" }, { "date": "2016-05-26T09:22:00", "db": "PACKETSTORM", "id": "137201" }, { "date": "2016-05-13T16:14:35", "db": "PACKETSTORM", "id": "136992" }, { "date": "2016-12-16T16:34:49", "db": "PACKETSTORM", "id": "140182" }, { "date": "2015-12-04T17:22:00", "db": "PACKETSTORM", "id": "134632" }, { "date": "2015-12-06T20:59:04.707000", "db": "NVD", "id": "CVE-2015-3194" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2015-3194" }, { "date": "2017-12-19T22:37:00", "db": "BID", "id": "78623" }, { "date": "2023-11-07T02:25:31.567000", "db": "NVD", "id": "CVE-2015-3194" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "78623" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL CVE-2015-3194 Denial of Service Vulnerability", "sources": [ { "db": "BID", "id": "78623" } ], "trust": 0.3 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Failure to Handle Exceptional Conditions", "sources": [ { "db": "BID", "id": "78623" } ], "trust": 0.3 } }
ghsa-g2vh-4463-xcx8
Vulnerability from github
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
{ "affected": [], "aliases": [ "CVE-2015-3194" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-12-06T20:59:00Z", "severity": "HIGH" }, "details": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "id": "GHSA-g2vh-4463-xcx8", "modified": "2025-04-12T12:54:30Z", "published": "2022-05-14T01:36:12Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "type": "WEB", "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e" }, { "type": "WEB", "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17" }, { "type": "WEB", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=c394a488942387246653833359a5c94b5832674e" }, { "type": "WEB", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=d8541d7e9e63bf5f343af24644046c8d96498c17" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322" }, { "type": "WEB", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100" }, { "type": "WEB", "url": "http://fortiguard.com/advisory/openssl-advisory-december-2015" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=145382583417444\u0026w=2" }, { "type": "WEB", "url": "http://openssl.org/news/secadv/20151203.txt" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-2617.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3413" }, { "type": "WEB", "url": "http://www.fortiguard.com/advisory/openssl-advisory-december-2015" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/78623" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91787" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034294" }, { "type": "WEB", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.754583" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2830-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2015-3194
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-3194", "description": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "id": "GSD-2015-3194", "references": [ "https://www.suse.com/security/cve/CVE-2015-3194.html", "https://www.debian.org/security/2015/dsa-3413", "https://access.redhat.com/errata/RHSA-2016:2957", "https://access.redhat.com/errata/RHSA-2015:2617", "https://ubuntu.com/security/CVE-2015-3194", "https://advisories.mageia.org/CVE-2015-3194.html", "https://alas.aws.amazon.com/cve/html/CVE-2015-3194.html", "https://linux.oracle.com/cve/CVE-2015-3194.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-3194" ], "details": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "id": "GSD-2015-3194", "modified": "2023-12-13T01:20:07.495789Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3194", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "78623", "refsource": "BID", "url": "http://www.securityfocus.com/bid/78623" }, { "name": "20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=c394a488942387246653833359a5c94b5832674e", "refsource": "CONFIRM", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=c394a488942387246653833359a5c94b5832674e" }, { "name": "openSUSE-SU-2016:1332", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" }, { "name": "openSUSE-SU-2015:2288", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" }, { "name": "RHSA-2015:2617", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2617.html" }, { "name": "http://www.fortiguard.com/advisory/openssl-advisory-december-2015", "refsource": "CONFIRM", "url": "http://www.fortiguard.com/advisory/openssl-advisory-december-2015" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "SSA:2015-349-04", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.754583" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=d8541d7e9e63bf5f343af24644046c8d96498c17", "refsource": "CONFIRM", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=d8541d7e9e63bf5f343af24644046c8d96498c17" }, { "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100", "refsource": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "HPSBGN03536", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=145382583417444\u0026w=2" }, { "name": "USN-2830-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2830-1" }, { "name": "openSUSE-SU-2015:2289", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" }, { "name": "FEDORA-2015-d87d60b9a9", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "http://openssl.org/news/secadv/20151203.txt", "refsource": "CONFIRM", "url": "http://openssl.org/news/secadv/20151203.txt" }, { "name": "1034294", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034294" }, { "name": "openSUSE-SU-2016:0637", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" }, { "name": "http://fortiguard.com/advisory/openssl-advisory-december-2015", "refsource": "CONFIRM", "url": "http://fortiguard.com/advisory/openssl-advisory-december-2015" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322" }, { "name": "DSA-3413", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3413" }, { "name": "openSUSE-SU-2015:2318", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.1", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.12.9", "versionStartIncluding": "0.12.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.10.41", "versionStartIncluding": "0.10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "4.2.3", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3194" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=d8541d7e9e63bf5f343af24644046c8d96498c17", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=d8541d7e9e63bf5f343af24644046c8d96498c17" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "name": "http://openssl.org/news/secadv/20151203.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://openssl.org/news/secadv/20151203.txt" }, { "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=c394a488942387246653833359a5c94b5832674e", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=c394a488942387246653833359a5c94b5832674e" }, { "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "HPSBGN03536", "refsource": "HP", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=145382583417444\u0026w=2" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "91787", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "78623", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/78623" }, { "name": "openSUSE-SU-2016:1332", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" }, { "name": "openSUSE-SU-2016:0637", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" }, { "name": "http://fortiguard.com/advisory/openssl-advisory-december-2015", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://fortiguard.com/advisory/openssl-advisory-december-2015" }, { "name": "http://www.fortiguard.com/advisory/openssl-advisory-december-2015", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.fortiguard.com/advisory/openssl-advisory-december-2015" }, { "name": "openSUSE-SU-2015:2318", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" }, { "name": "FEDORA-2015-d87d60b9a9", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html" }, { "name": "DSA-3413", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3413" }, { "name": "openSUSE-SU-2015:2289", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" }, { "name": "20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl" }, { "name": "RHSA-2015:2617", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2617.html" }, { "name": "USN-2830-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2830-1" }, { "name": "SSA:2015-349-04", "refsource": "SLACKWARE", "tags": [ "Third Party Advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.754583" }, { "name": "openSUSE-SU-2015:2288", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322" }, { "name": "1034294", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034294" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-12-13T12:15Z", "publishedDate": "2015-12-06T20:59Z" } } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.