Action not permitted
Modal body text goes here.
cve-2014-3567
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:18.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBOV03227", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "HPSBHF03300", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "openSUSE-SU-2014:1331", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBUX03162", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "61130", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61130" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "1031052", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031052" }, { "name": "62070", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62070" }, { "name": "70586", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70586" }, { "name": "61073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61073" }, { "name": "USN-2385-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "HPSBMU03304", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "GLSA-201412-39", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "DSA-3053", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3053" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03223", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "HPSBMU03260", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205217" }, { "name": "SSRT101779", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "name": "openSUSE-SU-2016:0640", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=7fd4ce6a997be5f5c9e744ac527725c2850de203" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "APPLE-SA-2015-09-16-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "SUSE-SU-2014:1357", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "NetBSD-SA2014-015", "tags": [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.splunk.com/view/SP-CAAANST" }, { "name": "61837", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61837" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/HT204244" }, { "name": "SSRT101767", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "61207", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61207" }, { "name": "RHSA-2014:1652", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "62124", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62124" }, { "name": "59627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59627" }, { "name": "SSRT101894", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "61298", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61298" }, { "name": "HPSBMU03263", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "SUSE-SU-2014:1361", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" }, { "name": "HPSBMU03296", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "61990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61990" }, { "name": "61959", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61959" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "HPSBMU03267", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "HPSBMU03261", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "RHSA-2015:0126", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0126.html" }, { "name": "61058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61058" }, { "name": "MDVSA-2015:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "MDVSA-2014:203", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "62030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62030" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX216642" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "61819", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61819" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "RHSA-2014:1692", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-14T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBOV03227", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "HPSBHF03300", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "openSUSE-SU-2014:1331", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBUX03162", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "61130", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61130" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "1031052", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031052" }, { "name": "62070", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62070" }, { "name": "70586", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70586" }, { "name": "61073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61073" }, { "name": "USN-2385-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "HPSBMU03304", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "GLSA-201412-39", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "DSA-3053", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3053" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03223", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "HPSBMU03260", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205217" }, { "name": "SSRT101779", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "name": "openSUSE-SU-2016:0640", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=7fd4ce6a997be5f5c9e744ac527725c2850de203" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "APPLE-SA-2015-09-16-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "SUSE-SU-2014:1357", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "NetBSD-SA2014-015", "tags": [ "vendor-advisory", "x_refsource_NETBSD" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.splunk.com/view/SP-CAAANST" }, { "name": "61837", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61837" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/HT204244" }, { "name": "SSRT101767", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "61207", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61207" }, { "name": "RHSA-2014:1652", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "62124", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62124" }, { "name": "59627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59627" }, { "name": "SSRT101894", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "61298", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61298" }, { "name": "HPSBMU03263", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "SUSE-SU-2014:1361", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" }, { "name": "HPSBMU03296", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "61990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61990" }, { "name": "61959", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61959" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "HPSBMU03267", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "HPSBMU03261", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "RHSA-2015:0126", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0126.html" }, { "name": "61058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61058" }, { "name": "MDVSA-2015:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "MDVSA-2014:203", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "62030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62030" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX216642" }, { "name": "APPLE-SA-2015-01-27-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "61819", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61819" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "RHSA-2014:1692", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3567", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBOV03227", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", "refsource": "CONFIRM", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "HPSBHF03300", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "openSUSE-SU-2014:1331", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBUX03162", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "61130", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61130" }, { "name": "https://www.openssl.org/news/secadv_20141015.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "1031052", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031052" }, { "name": "62070", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62070" }, { "name": "70586", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70586" }, { "name": "61073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61073" }, { "name": "USN-2385-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "HPSBMU03304", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "GLSA-201412-39", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "DSA-3053", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3053" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03223", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "HPSBMU03260", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "https://support.apple.com/HT205217", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205217" }, { "name": "SSRT101779", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "name": "openSUSE-SU-2016:0640", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "APPLE-SA-2015-09-16-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "SUSE-SU-2014:1357", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "NetBSD-SA2014-015", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "name": "http://www.splunk.com/view/SP-CAAANST", "refsource": "CONFIRM", "url": "http://www.splunk.com/view/SP-CAAANST" }, { "name": "61837", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61837" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "SSRT101767", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "61207", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61207" }, { "name": "RHSA-2014:1652", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "62124", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62124" }, { "name": "59627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59627" }, { "name": "SSRT101894", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "61298", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61298" }, { "name": "HPSBMU03263", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "SUSE-SU-2014:1361", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" }, { "name": "HPSBMU03296", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "61990", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61990" }, { "name": "61959", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61959" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "name": "http://advisories.mageia.org/MGASA-2014-0416.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "HPSBMU03267", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "HPSBMU03261", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "RHSA-2015:0126", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0126.html" }, { "name": "61058", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61058" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "MDVSA-2014:203", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "62030", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62030" }, { "name": "https://support.citrix.com/article/CTX216642", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX216642" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "61819", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61819" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "RHSA-2014:1692", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3567", "datePublished": "2014-10-19T01:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:18.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-3567\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-10-19T01:55:13.933\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.\"},{\"lang\":\"es\",\"value\":\"Fuga de memoria en la funci\u00f3n tls_decrypt_ticket en t1_lib.c en OpenSSL anterior a 0.9.8zc, 1.0.0 anterior a 1.0.0o, y 1.0.1 anterior a 1.0.1j permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un ticket de sesi\u00f3n manipulado que provoca un fallo en la comprobaci\u00f3n de integridad.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":7.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.9.8zb\",\"matchCriteriaId\":\"7AA6173C-DA1F-4A3B-BB8A-E52F3B846134\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2075BD-6102-4B0F-839A-836E9585F43B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A2FA09E-2BF7-4968-B62D-00DA57F81EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02E634E-1E3D-4E44-BADA-76F92483A732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC2B07A-49EF-411F-8A4D-89435E22B043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E9480D6-3B6A-4C41-B8C1-C3F945040772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FF0A06-DA61-4250-B083-67E55E362677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6BA453-C150-4159-B80B-5465EFF83F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638A2E69-8AB6-4FEA-852A-FEF16A500C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C47D3A-B99D-401D-B6B8-1194B2DB4809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08355B10-E004-4BE6-A5AE-4D428810580B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738BCFDC-1C49-4774-95AE-E099F707DEF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B242C0-D27D-4644-AD19-5ACB853C9DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC683F2-4346-4E5E-A8D7-67B4F4D7827B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"132B9217-B0E0-4E3E-9096-162AA28E158E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7619F9A0-9054-4217-93D1-3EA64876C5B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D82C405-17E2-4DF1-8DF5-315BD5A41595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C96806F-4718-4BD3-9102-55A26AA86498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F16D65-8A46-4AC7-8970-73AB700035FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F393FF-7E6F-4671-BFBF-060162E12659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B85A09-CF8D-409D-966E-168F9959F6F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C684FB18-FDDC-4BED-A28C-C23EE6CD0094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74A79A7-4FAF-4C81-8622-050008B96AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEDACCB9-8D61-49EE-9957-9E58BC7BB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4993DD56-F9E3-4AC8-AC3E-BF204B950DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E884B241-F9C3-44F8-A420-DE65F5F3D660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A383620-B4F7-44A7-85DA-A4FF2E115D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0C6812-F455-49CF-B29B-9AC00306DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2D462C-A1B4-4572-A615-BDE9DC5F1E55\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0416.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1652.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1692.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0126.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59627\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61058\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61073\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61130\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61298\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61819\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61837\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61959\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61990\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/62030\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/62070\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/62124\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-39.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3053\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:203\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/70586\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1031052\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.splunk.com/view/SP-CAAANST\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2385-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=7fd4ce6a997be5f5c9e744ac527725c2850de203\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.apple.com/HT205217\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.citrix.com/article/CTX216642\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.openssl.org/news/secadv_20141015.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0416.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1652.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1692.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0126.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61073\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61819\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61837\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62070\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-39.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3053\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:203\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/70586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1031052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.splunk.com/view/SP-CAAANST\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2385-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=7fd4ce6a997be5f5c9e744ac527725c2850de203\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT205217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX216642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openssl.org/news/secadv_20141015.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
rhsa-2014_1692
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that contain a backported patch to mitigate the\nCVE-2014-3566 issue and fix two security issues are now available for Red\nHat Storage 2.1.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary.\n\nThis update adds support for the TLS Fallback Signaling Cipher Suite Value\n(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade\nattacks against applications which re-connect using a lower SSL/TLS\nprotocol version when the initial connection indicating the highest\nsupported protocol version fails.\n\nThis can prevent a forceful downgrade of the communication to SSL 3.0.\nThe SSL 3.0 protocol was found to be vulnerable to the padding oracle\nattack when using block cipher suites in cipher block chaining (CBC) mode.\nThis issue is identified as CVE-2014-3566, and also known under the alias\nPOODLE. This SSL 3.0 protocol flaw will not be addressed in a future\nupdate; it is recommended that users configure their applications to\nrequire at least TLS protocol version 1.0 for secure communication.\n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1232123\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. A remote attacker could\nsend multiple specially crafted handshake messages to exhaust all available\nmemory of an SSL/TLS or DTLS server. (CVE-2014-3513)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session\nticket integrity checks. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to mitigate the CVE-2014-3566 issue and correct\nthe CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,\nall services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1692", "url": "https://access.redhat.com/errata/RHSA-2014:1692" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1232123", "url": "https://access.redhat.com/articles/1232123" }, { "category": "external", "summary": "1152789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152789" }, { "category": "external", "summary": "1152953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152953" }, { "category": "external", "summary": "1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1692.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:37:49+00:00", "generator": { "date": "2024-11-22T08:37:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1692", "initial_release_date": "2014-10-22T17:15:52+00:00", "revision_history": [ { "date": "2014-10-22T17:15:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-22T17:15:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:37:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Storage Server 2.1", "product": { "name": "Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:2.1:server:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.src", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.src", "product_id": "openssl-0:1.0.1e-30.el6_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3513", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152953" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SRTP memory leak causes crash when using specially-crafted handshake message", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 5, Red Hat JBoss Enterprise Application Platform 5 and 6, and Red Hat Enterprise JBoss Enterprise Web Server 1 and 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3513" }, { "category": "external", "summary": "RHBZ#1152953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3513", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-22T17:15:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1692" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SRTP memory leak causes crash when using specially-crafted handshake message" }, { "cve": "CVE-2014-3567", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl shipped with Red Hat Enterprise Linux 5; Red Hat JBoss Enterprise Application Server 5 and 6; and Red Hat JBoss Enterprise Web Server 1 and 2 because openssl-0.9.8e does not include support for session tickets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3567" }, { "category": "external", "summary": "RHBZ#1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-22T17:15:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1692" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash" } ] }
rhsa-2014_1652
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that contain a backported patch to mitigate the\nCVE-2014-3566 issue and fix two security issues are now available for Red\nHat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary.\n\nThis update adds support for the TLS Fallback Signaling Cipher Suite Value\n(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade\nattacks against applications which re-connect using a lower SSL/TLS\nprotocol version when the initial connection indicating the highest\nsupported protocol version fails.\n\nThis can prevent a forceful downgrade of the communication to SSL 3.0.\nThe SSL 3.0 protocol was found to be vulnerable to the padding oracle\nattack when using block cipher suites in cipher block chaining (CBC) mode.\nThis issue is identified as CVE-2014-3566, and also known under the alias\nPOODLE. This SSL 3.0 protocol flaw will not be addressed in a future\nupdate; it is recommended that users configure their applications to\nrequire at least TLS protocol version 1.0 for secure communication.\n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1232123\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. A remote attacker could\nsend multiple specially crafted handshake messages to exhaust all available\nmemory of an SSL/TLS or DTLS server. (CVE-2014-3513)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session\nticket integrity checks. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to mitigate the CVE-2014-3566 issue and correct\nthe CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,\nall services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1652", "url": "https://access.redhat.com/errata/RHSA-2014:1652" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1232123", "url": "https://access.redhat.com/articles/1232123" }, { "category": "external", "summary": "1152789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152789" }, { "category": "external", "summary": "1152953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152953" }, { "category": "external", "summary": "1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1652.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:37:39+00:00", "generator": { "date": "2024-11-22T08:37:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1652", "initial_release_date": "2014-10-16T14:59:13+00:00", "revision_history": [ { "date": "2014-10-16T14:59:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-16T14:59:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:37:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.src", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.src", "product_id": "openssl-0:1.0.1e-30.el6_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=src" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.6.src", "product": { "name": "openssl-1:1.0.1e-34.el7_0.6.src", "product_id": "openssl-1:1.0.1e-34.el7_0.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.ppc", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc", "product_id": "openssl-0:1.0.1e-30.el6_6.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.s390", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390", "product_id": "openssl-0:1.0.1e-30.el6_6.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3513", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152953" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SRTP memory leak causes crash when using specially-crafted handshake message", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 5, Red Hat JBoss Enterprise Application Platform 5 and 6, and Red Hat Enterprise JBoss Enterprise Web Server 1 and 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3513" }, { "category": "external", "summary": "RHBZ#1152953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3513", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-16T14:59:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1652" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SRTP memory leak causes crash when using specially-crafted handshake message" }, { "cve": "CVE-2014-3567", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl shipped with Red Hat Enterprise Linux 5; Red Hat JBoss Enterprise Application Server 5 and 6; and Red Hat JBoss Enterprise Web Server 1 and 2 because openssl-0.9.8e does not include support for session tickets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3567" }, { "category": "external", "summary": "RHBZ#1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-16T14:59:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1652" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash" } ] }
rhsa-2015_0126
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes multiple security issues is\nnow available for Red Hat Enterprise Virtualization 3.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA heap-based buffer overflow was found in glibc\u0027s\n__nss_hostname_digits_dots() function, which is used by the gethostbyname()\nand gethostbyname2() glibc function calls. A remote attacker able to make\nan application call either of these functions could use this flaw to\nexecute arbitrary code with the permissions of the user running the\napplication. (CVE-2015-0235)\n\nA race condition flaw was found in the way the Linux kernel\u0027s KVM subsystem \nhandled PIT (Programmable Interval Timer) emulation. A guest user who has \naccess to the PIT I/O ports could use this flaw to crash the host. \n(CVE-2014-3611)\n\nA flaw was found in the way OpenSSL handled fragmented handshake packets.\nA man-in-the-middle attacker could use this flaw to force a TLS/SSL server\nusing OpenSSL to use TLS 1.0, even if both the client and the server\nsupported newer protocol versions. (CVE-2014-3511)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session\nticket integrity checks. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nIt was found that the Linux kernel\u0027s KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646)\n\nRed Hat would like to thank Qualys for reporting the CVE-2015-0235 issue,\nLars Bull of Google for reporting the CVE-2014-3611 issue, and the Advanced\nThreat Research team at Intel Security for reporting the CVE-2014-3645 and\nCVE-2014-3646 issues.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0126", "url": "https://access.redhat.com/errata/RHSA-2015:0126" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1127504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1127504" }, { "category": "external", "summary": "1144825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144825" }, { "category": "external", "summary": "1144835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144835" }, { "category": "external", "summary": "1144878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144878" }, { "category": "external", "summary": "1152563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152563" }, { "category": "external", "summary": "1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "external", "summary": "1180044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180044" }, { "category": "external", "summary": "1183461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183461" }, { "category": "external", "summary": "1185720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185720" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0126.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security update", "tracking": { "current_release_date": "2024-11-22T08:37:35+00:00", "generator": { "date": "2024-11-22T08:37:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:0126", "initial_release_date": "2015-02-04T17:52:31+00:00", "revision_history": [ { "date": "2015-02-04T17:52:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-02-04T17:52:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:37:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch", "product": { "name": "rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch", "product_id": "rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.6-20150123.1.el6ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" }, "product_reference": "rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3511", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "discovery_date": "2014-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1127504" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL handled fragmented handshake packets. A man-in-the-middle attacker could use this flaw to force a TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client and the server supported newer protocol versions.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: TLS protocol downgrade attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3511" }, { "category": "external", "summary": "RHBZ#1127504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1127504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3511", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3511" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140806.txt", "url": "https://www.openssl.org/news/secadv_20140806.txt" } ], "release_date": "2014-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-04T17:52:31+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0126" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: TLS protocol downgrade attack" }, { "cve": "CVE-2014-3567", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl shipped with Red Hat Enterprise Linux 5; Red Hat JBoss Enterprise Application Server 5 and 6; and Red Hat JBoss Enterprise Web Server 1 and 2 because openssl-0.9.8e does not include support for session tickets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3567" }, { "category": "external", "summary": "RHBZ#1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-04T17:52:31+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0126" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash" }, { "acknowledgments": [ { "names": [ "Lars Bull" ], "organization": "Google" } ], "cve": "CVE-2014-3611", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2014-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1144878" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in the way the Linux kernel\u0027s KVM subsystem handled PIT (Programmable Interval Timer) emulation. A guest user who has access to the PIT I/O ports could use this flaw to crash the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: PIT timer race condition", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6 and 7. This issue does affect the kvm packages as shipped with Red Hat Enterprise Linux 5. Future updates may address this issue in the\nrespective Red Hat Enterprise Linux releases.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3611" }, { "category": "external", "summary": "RHBZ#1144878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3611", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3611" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3611", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3611" } ], "release_date": "2014-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-04T17:52:31+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0126" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kvm: PIT timer race condition" }, { "acknowledgments": [ { "names": [ "Advanced Threat Research team at Intel Security" ] } ], "cve": "CVE-2014-3645", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2014-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1144835" } ], "notes": [ { "category": "description", "text": "It was found that the Linux kernel\u0027s KVM subsystem did not handle the VM exits gracefully for the invept (Invalidate Translations Derived from EPT) instructions. On hosts with an Intel processor and invept VM exit support, an unprivileged guest user could use these instructions to crash the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: invept vm exit not handled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6 and 7. Future updates may address this issue in the\nrespective Red Hat Enterprise Linux releases.\n\n\nThis issue does affect the kvm packages as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3645" }, { "category": "external", "summary": "RHBZ#1144835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144835" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3645", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3645" } ], "release_date": "2014-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-04T17:52:31+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0126" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kvm: vmx: invept vm exit not handled" }, { "acknowledgments": [ { "names": [ "Advanced Threat Research team at Intel Security" ] } ], "cve": "CVE-2014-3646", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2014-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1144825" } ], "notes": [ { "category": "description", "text": "It was found that the Linux kernel\u0027s KVM subsystem did not handle the VM exits gracefully for the invvpid (Invalidate Translations Based on VPID) instructions. On hosts with an Intel processor and invppid VM exit support, an unprivileged guest user could use these instructions to crash the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: invvpid vm exit not handled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 6 and 7. Future updates may address this issue in the\nrespective Red Hat Enterprise Linux releases.\n\nThis issue does affect the kvm packages as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3646" }, { "category": "external", "summary": "RHBZ#1144825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144825" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3646" } ], "release_date": "2014-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-04T17:52:31+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0126" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kvm: vmx: invvpid vm exit not handled" }, { "cve": "CVE-2015-0235", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2015-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1183461" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow was found in glibc\u0027s __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "glibc: __nss_hostname_digits_dots() heap-based buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0235" }, { "category": "external", "summary": "RHBZ#1183461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183461" }, { "category": "external", "summary": "RHSB-ghost", "url": "https://access.redhat.com/security/vulnerabilities/ghost" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0235", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0235" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2015/01/27/9", "url": "http://www.openwall.com/lists/oss-security/2015/01/27/9" }, { "category": "external", "summary": "https://access.redhat.com/articles/1332213", "url": "https://access.redhat.com/articles/1332213" }, { "category": "external", "summary": "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability", "url": "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability" } ], "release_date": "2015-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-04T17:52:31+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0126" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.6-20150123.1.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "glibc: __nss_hostname_digits_dots() heap-based buffer overflow" } ] }
var-201410-1144
Vulnerability from variot
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. OpenSSL is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. Implementations of OpenSSL that have been compiled with OPENSSL_NO_SRTP defined are not affected.
This issue was reported to OpenSSL on 26th September 2014, based on an original issue and patch developed by the LibreSSL project. Further analysis of the issue was performed by the OpenSSL team.
The fix was developed by the OpenSSL team.
This issue was reported to OpenSSL on 8th October 2014.
The fix was developed by Stephen Henson of the OpenSSL core team.
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 https://www.openssl.org/~bodo/ssl-poodle.pdf
Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.
This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.
The fix was developed by Akamai and the OpenSSL team.
References
URL for this Security Advisory: https://www.openssl.org/news/secadv_20141015.txt
Note: the online version of the advisory may be updated with additional details over time.
For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: openssl security update Advisory ID: RHSA-2014:1652-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1652.html Issue date: 2014-10-16 CVE Names: CVE-2014-3513 CVE-2014-3567 =====================================================================
- Summary:
Updated openssl packages that contain a backported patch to mitigate the CVE-2014-3566 issue and fix two security issues are now available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library.
This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails.
This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication.
For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123
A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. (CVE-2014-3567)
All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to mitigate the CVE-2014-3566 issue and correct the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: openssl-1.0.1e-30.el6_6.2.src.rpm
i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: openssl-1.0.1e-30.el6_6.2.src.rpm
x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: openssl-1.0.1e-30.el6_6.2.src.rpm
i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
ppc64: openssl-1.0.1e-30.el6_6.2.ppc.rpm openssl-1.0.1e-30.el6_6.2.ppc64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.ppc.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm openssl-devel-1.0.1e-30.el6_6.2.ppc.rpm openssl-devel-1.0.1e-30.el6_6.2.ppc64.rpm
s390x: openssl-1.0.1e-30.el6_6.2.s390.rpm openssl-1.0.1e-30.el6_6.2.s390x.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.s390.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm openssl-devel-1.0.1e-30.el6_6.2.s390.rpm openssl-devel-1.0.1e-30.el6_6.2.s390x.rpm
x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm
ppc64: openssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm openssl-perl-1.0.1e-30.el6_6.2.ppc64.rpm openssl-static-1.0.1e-30.el6_6.2.ppc64.rpm
s390x: openssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm openssl-perl-1.0.1e-30.el6_6.2.s390x.rpm openssl-static-1.0.1e-30.el6_6.2.s390x.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: openssl-1.0.1e-30.el6_6.2.src.rpm
i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: openssl-1.0.1e-34.el7_0.6.src.rpm
ppc64: openssl-1.0.1e-34.el7_0.6.ppc64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm openssl-devel-1.0.1e-34.el7_0.6.ppc.rpm openssl-devel-1.0.1e-34.el7_0.6.ppc64.rpm openssl-libs-1.0.1e-34.el7_0.6.ppc.rpm openssl-libs-1.0.1e-34.el7_0.6.ppc64.rpm
s390x: openssl-1.0.1e-34.el7_0.6.s390x.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm openssl-devel-1.0.1e-34.el7_0.6.s390.rpm openssl-devel-1.0.1e-34.el7_0.6.s390x.rpm openssl-libs-1.0.1e-34.el7_0.6.s390.rpm openssl-libs-1.0.1e-34.el7_0.6.s390x.rpm
x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: openssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm openssl-perl-1.0.1e-34.el7_0.6.ppc64.rpm openssl-static-1.0.1e-34.el7_0.6.ppc.rpm openssl-static-1.0.1e-34.el7_0.6.ppc64.rpm
s390x: openssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm openssl-perl-1.0.1e-34.el7_0.6.s390x.rpm openssl-static-1.0.1e-34.el7_0.6.s390.rpm openssl-static-1.0.1e-34.el7_0.6.s390x.rpm
x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2014-3513.html https://www.redhat.com/security/data/cve/CVE-2014-3567.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/1232123
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFUP940XlSAg2UNWIIRAhUYAJ4or1rZ25E0BXjTPyeDsN+keTz3twCdHDEz qY686VXQQ02SLq5vTvKfuHk= =McEc -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Corrected: 2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1) 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10) 2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE) 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3) 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13) 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20) 2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE) 2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17) CVE Name: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
FreeBSD includes software from the OpenSSL Project.
II. [CVE-2014-3513]. [CVE-2014-3567]. This protocol weakness makes it possible for an attacker to obtain clear text data through a padding-oracle attack.
Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE [CVE-2014-3566].
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade.
When OpenSSL is configured with "no-ssl3" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them. [CVE-2014-3568].
III. [CVE-2014-3567].
An active man-in-the-middle attacker can force a protocol downgrade to SSLv3 and exploit the weakness of SSLv3 to obtain clear text data from the connection. [CVE-2014-3566] [CVE-2014-3568]
IV. Workaround
No workaround is available.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
[FreeBSD 10.0]
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc
gpg --verify openssl-10.0.patch.asc
[FreeBSD 9.3]
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc
gpg --verify openssl-9.3.patch.asc
[FreeBSD 8.4, 9.1 and 9.2]
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc
gpg --verify openssl-8.4.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in
Restart all deamons using the library, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/8/ r273151 releng/8.4/ r273416 stable/9/ r273151 releng/9.1/ r273415 releng/9.2/ r273415 releng/9.3/ r273415 stable/10/ r273149 releng/10.0/ r273415 releng/10.1/ r273399
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
VII. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2015-09-16-2 Xcode 7.0
Xcode 7.0 is now available and addresses the following:
DevTools Available for: OS X Yosemite v10.10.4 or later Impact: An attacker may be able to bypass access restrictions Description: An API issue existed in the apache configuration. This issue was addressed by updating header files to use the latest version. CVE-ID CVE-2015-3185 : Branko Aibej of the Apache Software Foundation
IDE Xcode Server Available for: OS X Yosemite 10.10 or later Impact: An attacker may be able to access restricted parts of the filesystem Description: A comparison issue existed in the node.js send module prior to version 0.8.4. This issue was addressed by upgrading to version 0.12.3. CVE-ID CVE-2014-6394 : Ilya Kantor
IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilties in OpenSSL Description: Multiple vulnerabilties existed in the node.js OpenSSL module prior to version 1.0.1j. CVE-ID CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568
IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: An attacker with a privileged network position may be able to inspect traffic to Xcode Server Description: Connections to Xcode Server may have been made without encryption. This issue was addressed through improved network connection logic. CVE-ID CVE-2015-5910 : an anonymous researcher
IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Build notifications may be sent to unintended recipients Description: An access issue existed in the handling of repository email lists. This issue was addressed through improved validation. CVE-ID CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of Anchorfree
subversion Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilities existed in svn versions prior to 1.7.19 Description: Multiple vulnerabilities existed in svn versions prior to 1.7.19. These issues were addressed by updating svn to version 1.7.20. CVE-ID CVE-2015-0248 CVE-2015-0251
Xcode 7.0 may be obtained from: https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
- Select Xcode in the menu bar
- Select About Xcode
- The version after applying this update will be "7.0". Summary
VMware vCenter Server, ESXi, Workstation, Player and Fusion address several security issues. Relevant Releases
VMware Workstation 10.x prior to version 10.0.5
VMware Player 6.x prior to version 6.0.5
VMware Fusion 7.x prior to version 7.0.1 VMware Fusion 6.x prior to version 6.0.5
vCenter Server 5.5 prior to Update 2d
ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG ESXi 5.1 without patch ESXi510-201404101-SG ESXi 5.0 without patch ESXi500-201405101-SG
- Problem Description
a. VMware ESXi, Workstation, Player, and Fusion host privilege escalation vulnerability
VMware ESXi, Workstation, Player and Fusion contain an arbitrary
file write issue. Exploitation this issue may allow for privilege
escalation on the host.
The vulnerability does not allow for privilege escalation from
the guest Operating System to the host or vice-versa. This means
that host memory can not be manipulated from the Guest Operating
System.
Mitigation
For ESXi to be affected, permissions must have been added to ESXi
(or a vCenter Server managing it) for a virtual machine
administrator role or greater.
VMware would like to thank Shanon Olsson for reporting this issue to
us through JPCERT.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2014-8370 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any 6.0.5
ESXi 5.5 ESXi ESXi550-201403102-SG
ESXi 5.1 ESXi ESXi510-201404101-SG
ESXi 5.0 ESXi ESXi500-201405101-SG
b. VMware Workstation, Player, and Fusion Denial of Service vulnerability
VMware Workstation, Player, and Fusion contain an input validation
issue in the Host Guest File System (HGFS). This issue may allow
for a Denial of Service of the Guest Operating system.
VMware would like to thank Peter Kamensky from Digital Security for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1043 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any 7.0.1
Fusion 6.x any 6.0.5
c. VMware ESXi, Workstation, and Player Denial of Service vulnerability
VMware ESXi, Workstation, and Player contain an input
validation issue in VMware Authorization process (vmware-authd).
This issue may allow for a Denial of Service of the host. On
VMware ESXi and on Workstation running on Linux the Denial of
Service would be partial.
VMware would like to thank Dmitry Yudin @ret5et for reporting
this issue to us through HP's Zero Day Initiative.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1044 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any not affected
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi ESXi510-201410101-SG
ESXi 5.0 ESXi not affected
d.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2014-3513, CVE-2014-3567,
CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter Server 5.5 any Update 2d*
vCenter Server 5.1 any patch pending
vCenter Server 5.0 any patch pending
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
* The VMware vCenter 5.5 SSO component will be
updated in a later release
e. Update to ESXi libxml2 package
The libxml2 library is updated to version libxml2-2.7.6-17
to resolve a security issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3660 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation 10.x
https://www.vmware.com/go/downloadworkstation
VMware Player 6.x
https://www.vmware.com/go/downloadplayer
VMware Fusion 7.x and 6.x
https://www.vmware.com/go/downloadplayer
vCenter Server
Downloads and Documentation: https://www.vmware.com/go/download-vsphere
ESXi 5.5 Update 2d
File: update-from-esxi5.5-5.5_update01.zip md5sum: 5773844efc7d8e43135de46801d6ea25 sha1sum: 6518355d260e81b562c66c5016781db9f077161f http://kb.vmware.com/kb/2065832 update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG
ESXi 5.5
File: ESXi550-201501001.zip md5sum: b0f2edd9ad17d0bae5a11782aaef9304 sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1 http://kb.vmware.com/kb/2099265 ESXi550-201501001.zip contains ESXi550-201501101-SG
ESXi 5.1
File: ESXi510-201404001.zip md5sum: 9dc3c9538de4451244a2b62d247e52c4 sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66 http://kb.vmware.com/kb/2070666 ESXi510-201404001 contains ESXi510-201404101-SG
ESXi 5.0
File: ESXi500-201405001.zip md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5 http://kb.vmware.com/kb/2075521 ESXi500-201405001 contains ESXi500-201405101-SG
- Change log
2015-01-27 VMSA-2015-0001 Initial security advisory in conjunction with the release of VMware Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d and, ESXi 5.5 Patches released on 2015-01-27. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html
Twitter https://twitter.com/VMwareSRC
Copyright 2015 VMware Inc. All rights reserved. The HP Insight Control 7.2.3 Update kit applicable to HP Insight Control 7.2.x installations is available at the following location:
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =HPICE
NOTE: Please read the readme.txt file before proceeding with the installation.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 https://www.openssl.org/news/secadv_20141015.txt
Updated Packages:
Mandriva Business Server 1/X86_64: 054c36eb1d59a0556ab17a1627f869d2 mbs1/x86_64/lib64openssl1.0.0-1.0.0o-1.mbs1.x86_64.rpm aaff926dab60e6d5635afde92edd9c91 mbs1/x86_64/lib64openssl-devel-1.0.0o-1.mbs1.x86_64.rpm 27a964cb0697f9a8d0c487db11928cca mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0o-1.mbs1.x86_64.rpm 012ccb3cd7acc23e33666290036d0ec9 mbs1/x86_64/lib64openssl-static-devel-1.0.0o-1.mbs1.x86_64.rpm dba56f5d00437cfb90c7fecaa7dc2e86 mbs1/x86_64/openssl-1.0.0o-1.mbs1.x86_64.rpm 89ba517c11cc244d57ecb98ec4be4140 mbs1/SRPMS/openssl-1.0.0o-1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. Relevant releases/architectures:
RHEV Hypervisor for RHEL-6 - noarch
- The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions.
A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application. (CVE-2015-0235)
A race condition flaw was found in the way the Linux kernel's KVM subsystem handled PIT (Programmable Interval Timer) emulation. A guest user who has access to the PIT I/O ports could use this flaw to crash the host. A man-in-the-middle attacker could use this flaw to force a TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client and the server supported newer protocol versions. (CVE-2014-3567)
It was found that the Linux kernel's KVM subsystem did not handle the VM exits gracefully for the invept (Invalidate Translations Derived from EPT) and invvpid (Invalidate Translations Based on VPID) instructions. On hosts with an Intel processor and invept/invppid VM exit support, an unprivileged guest user could use these instructions to crash the guest. HP BladeSystem c-Class Onboard Administrator (OA) 4.30 and earlier.
Go to http://www.hp.com/go/oa
Select "Onboard Administrator Firmware" Select product name as ""HP BLc3000 Onboard Administrator Option" or "HP BLc7000 Onboard Administrator Option" Select the operating system from the list of choices Select Firmware version 4.40 for download Refer to the HP BladeSystem Onboard Administrator User Guide for steps to update the Onboard Administrator firmware.
Release Date: 2014-10-28 Last Updated: 2014-10-28
Potential Security Impact: Remote Denial of Service (DoS), unauthorized access, man-in-the-middle (MitM) attack
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX running OpenSSL.
This is the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "Poodle", which could be exploited remotely to allow disclosure of information.
References:
CVE-2014-3566 Man-in-th-Middle (MitM) attack CVE-2014-3567 Remote Unauthorized Access CVE-2014-3568 Remote Denial of Service (DoS) SSRT101767
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before v0.9.8zc
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following updates to resolve these vulnerabilities. The updates are available from the following ftp site.
ftp://ssl098zc:Secure12@ftp.usa.hp.com
User name: ssl098zc Password: (NOTE: Case sensitive) Secure12
HP-UX Release HP-UX OpenSSL version
B.11.11 (11i v1) A.00.09.08zc.001_HP-UX_B.11.11_32+64.depot
B.11.23 (11i v2) A.00.09.08zc.002_HP-UX_B.11.23_IA-PA.depot
B.11.31 (11i v3) A.00.09.08zc.003_HP-UX_B.11.31_IA-PA.depot
MANUAL ACTIONS: Yes - Update
Install OpenSSL A.00.09.08zc or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.11
openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zc.001 or subsequent
HP-UX B.11.23
openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zc.002 or subsequent
HP-UX B.11.31
openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.00.09.08zc.003 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 28 October 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201410-1144", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "flex system chassis management module", "scope": null, "trust": 3.3, "vendor": "ibm", "version": null }, { "model": "flex system chassis management module", "scope": "eq", "trust": 1.8, "vendor": "ibm", "version": "1.50.1" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1f" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1i" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1a" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1h" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1d" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1b" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1g" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.6, "vendor": "openssl", "version": "1.0.1e" }, { "model": "flex system chassis management module 1.1.1", "scope": null, "trust": 1.2, "vendor": "ibm", "version": null }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "0.9.8zb" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0l" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0n" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0m" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0k" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0j" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.0a" }, { "model": "bladecenter advanced management module 3.66n", "scope": "ne", "trust": 0.9, "vendor": "ibm", "version": null }, { "model": "bladecenter advanced management module 3.66k", "scope": null, "trust": 0.9, "vendor": "ibm", "version": null }, { "model": "flex system chassis management module 1.50.0", "scope": null, "trust": 0.6, "vendor": "ibm", "version": null }, { "model": "global console manager", "scope": "ne", "trust": 0.6, "vendor": "ibm", "version": "1.26.1.23978" }, { "model": "global console manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.4.2.15036" }, { "model": "global console manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.20.20.23447" }, { "model": "flex system chassis management module", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.50.0" }, { "model": "project openssl 1.0.0a", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "local console manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.2.39.0" }, { "model": "local console manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.2.27.00" }, { "model": "local console manager", "scope": "ne", "trust": 0.6, "vendor": "ibm", "version": "1.2.40.00" }, { "model": "flex system chassis management module 1.40.1", "scope": null, "trust": 0.6, "vendor": "ibm", "version": null }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "nextscale n1200 enclosure fan power controller fhet23g-2.06", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "bladecenter advanced management module 25r5778", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "q", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1948" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.3" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.11" }, { "model": "k", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "upward integration modules scvmm add-in", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.0.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1" }, { "model": "project openssl 1.0.0d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "project openssl 1.0.1e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.21" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "project openssl 0.9.8u", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "project openssl 1.0.1a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.0" }, { "model": "aspera shares", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "1.7.5" }, { "model": "norman shark industrial control system protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.2.3" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "norman shark industrial control system protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "packetshaper s-series", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "11.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.1" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0.4" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "flex system chassis management module 1.20.2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "connect:enterprise secure client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "project openssl 1.0.0g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cloudsystem enterprise software", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1.2" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "tivoli netcool/reporter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "proxyav", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.5" }, { "model": "insight control server provisioning", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "norman shark scada protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "netscaler t1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "project openssl 0.9.8zb", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "norman shark industrial control system protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.2" }, { "model": "j", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "project openssl 1.0.1j", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "wb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.2.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.3" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.1.0" }, { "model": "n", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "policycenter", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "9.2" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "project openssl 1.0.0o", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "pa", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "m210", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "vsr1000", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.2" }, { "model": "project openssl 0.9.8w", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "flex system ib6131 40gb infiniband switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.4" }, { "model": "bladesystem c-class onboard administrator", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.40" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.2" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "119000" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.2" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.4" }, { "model": "x-series xos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "10.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.11" }, { "model": "project openssl 1.0.0m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sterling connect:express for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11150-11" }, { "model": "norman shark network protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.0" }, { "model": "nextscale n1200 enclosure fan power controller fhet21c-2.04", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "rational application developer for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.4" }, { "model": "project openssl 1.0.1g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "project openssl 0.9.8m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "norman shark scada protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.2.3" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "rational application developer for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "megaraid storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "15.03.01.00" }, { "model": "command center appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "aspera shares", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "1.0.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.4" }, { "model": "bladecenter -t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8720" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.23" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.2" }, { "model": "tivoli netcool/system service monitor fp11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.2.1" }, { "model": "sterling file gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.4" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.22" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "project openssl 1.0.1i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70000" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "r2122", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7900" }, { "model": "flex system chassis management module 1.40.2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli netcool/system service monitor fp12", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "project openssl 1.0.0h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "tivoli provisioning manager for os deployment", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.1" }, { "model": "infosphere master data management patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "netcool/system service monitor fp1 p14", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0-" }, { "model": "flex system en6131 40gb ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.4" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.0" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.1" }, { "model": "flex system ib6131 40gb infiniband switch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.4.1110" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.3" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "policycenter", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "9.2.10" }, { "model": "netcool/system service monitor fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8886" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.10" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "office connect ps1810", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "qradar siem mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "aura communication manager ssp04", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2" }, { "model": "ex series network switches for ibm products pre 12.3r9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl 0.9.8r", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.7" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.0" }, { "model": "aspera faspex", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.0.3" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "m.10", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3" }, { "model": "project openssl 0.9.8n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "connect:enterprise command line client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "virtual connect enterprise manager sdk", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79000" }, { "model": "malware analyzer g2", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.5" }, { "model": "aspera proxy", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "1.2.3" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "proxyav", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.4" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "project openssl 0.9.8y", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "bcaaa", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1" }, { "model": "aspera mobile", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "upward integration modules for microsoft system center", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.5.3" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "project openssl beta4", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.0" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "h.10", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "upward integration modules hardware management pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "project openssl 1.0.0l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.20" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "upward integration modules integrated installer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2" }, { "model": "general parallel file system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.0" }, { "model": "norman shark scada protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.2" }, { "model": "project openssl beta5", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.0" }, { "model": "tivoli netcool/system service monitor fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7967" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.1.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.0" }, { "model": "aspera drive", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "infosphere master data management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.3" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.9" }, { "model": "content analysis system", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.2" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.53" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.4" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.3" }, { "model": "project openssl 0.9.8p", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "flex system chassis management module 1.20.1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "security analytics platform", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "6.6.10" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "norman shark scada protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.3.2" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "12500(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "v7)0" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8852" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "bladecenter -ht", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8750" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.1" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "57000" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.5.0" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "aspera console", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "2.3.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.1" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.5" }, { "model": "r", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.2" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "norman shark network protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.2" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.0.1" }, { "model": "esxi esxi550-20150110", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "kb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.8.0" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129000" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.3" }, { "model": "nextscale n1200 enclosure fan power controller fhet24d-2.08", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.6" }, { "model": "i.10", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.2" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "project openssl 0.9.8za", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "7.0" }, { "model": "m.08", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.4.1" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "ssl visibility", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.8" }, { "model": "project openssl 0.9.8q", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.3" }, { "model": "sterling connect:express for unix ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11150-11" }, { "model": "systems insight manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "infosphere master data management provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.0" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-493" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.2" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.8" }, { "model": "ssl visibility 3.8.2f", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": null }, { "model": "rational application developer for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0.1" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.6" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.6" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.3.6" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.3" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-453" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0" }, { "model": "director", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "6.1.16.1" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.3" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.3" }, { "model": "sterling connect:express for unix ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.4.6.1146-109" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "tivoli netcool/system service monitor fp10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.5" }, { "model": "project openssl 1.0.1c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.4" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-467" }, { "model": "vb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1881" }, { "model": "connect:enterprise secure client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56001" }, { "model": "ka", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "security analytics platform", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "7.1.6" }, { "model": "office connect pk", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18100" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v5000-" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "nextscale n1200 enclosure fan power controller fhet21e-2.05", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aspera proxy", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "1.2.2" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8v" }, { "model": "norman shark network protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.3.2" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "project openssl 1.0.1f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "yb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "aspera connect server", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.1" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.2" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.4.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.1" }, { "model": "flex system chassis management module 1.40.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli provisioning manager for images", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.0" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "upward integration modules scvmm add-in", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.5" }, { "model": "project openssl 0.9.8g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "bcaaa", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.5" }, { "model": "nextscale n1200 enclosure fan power controller fhet24b-2.07", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "cms r17", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "flex system fc3171 8gb san switch and san pass-thru", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1.5.03.00" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.41" }, { "model": "aspera ondemand for google cloud", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.2.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.21" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.0" }, { "model": "aura utility services sp7", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4" }, { "model": "sterling file gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.5.2" }, { "model": "aspera console", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "2.5.3" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.63" }, { "model": "e", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.20" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "tivoli workload scheduler for applications fp02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.2" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7779" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "upward integration modules for vmware vsphere", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.5.3" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.2" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.10" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.20" }, { "model": "splunk", "scope": "ne", "trust": 0.3, "vendor": "splunk", "version": "5.0.11" }, { "model": "tivoli netcool/system service monitor fp13", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "aspera faspex", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "3.9" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.40" }, { "model": "msr2000 r0106p18", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "va", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.32" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aspera ondemand for softlayer", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.4" }, { "model": "tivoli netcool/system service monitor fp6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.4" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "aspera ondemand for azure", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "r2311p05", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5700" }, { "model": "aspera shares", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "1.9" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0" }, { "model": "qradar risk manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.3" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "msm", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.46.4.2.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.0" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "aspera connect server", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "aspera client", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "project openssl 0.9.8l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "version control repository manager 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.4" }, { "model": "aspera outlook plugin", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.4.2" }, { "model": "project openssl 0.9.8zc", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.01" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "system management homepage 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.0" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1.131" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.5" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "ssl visibility", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.7" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.3.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.2" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.2.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.1" }, { "model": "project openssl 1.0.0i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56003" }, { "model": "sterling connect:enterprise http option", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.2" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.0.0" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.0" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.3" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.2" }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "tivoli workload scheduler for applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "flex system chassis management module 1.20.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2" }, { "model": "sterling connect:express for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6.1146-108" }, { "model": "aspera enterprise server", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.1" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.0" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "project openssl 1.0.0e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "packetshaper", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "9.2.10" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.5" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.1.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "aspera shares", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "1.7.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.10" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1.2" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8x" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.3.2" }, { "model": "ps110", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "upward integration modules hardware management pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.5.3" }, { "model": "aspera point to point", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.33" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "packetshaper s-series", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "11.2" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.3.0" }, { "model": "upward integration modules integrated installer", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.5.3" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.3" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3" }, { "model": "project openssl 0.9.8t", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "splunk", "scope": "ne", "trust": 0.3, "vendor": "splunk", "version": "6.0.7" }, { "model": "tivoli netcool/system service monitor fp8", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.1.0" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70000" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "imc uam e0302p07", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.6" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.71" }, { "model": "switch series (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10500v7)0" }, { "model": "aspera faspex", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.7.5" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.1" }, { "model": "project openssl 1.0.0c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "qradar vulnerability manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.0" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.0" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.3" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.1.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "ra", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "tuxedo", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.1.0" }, { "model": "proxysg sgos", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "6.5.6.1" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "rf manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.9.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.6.0" }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "project openssl 1.0.0f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "tivoli management framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "packetshaper s-series", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "11.1" }, { "model": "h.07", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "infosphere master data management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.1" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "tivoli netcool/system service monitor fp4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "ssl for openvms", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.4-495" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.12" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.5" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2.2" }, { "model": "office connect pm", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18100" }, { "model": "project openssl 1.0.0j", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "project openssl 1.0.0b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "content analysis system", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1" }, { "model": "ya", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "switch series r2311p05", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5900" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "bladecenter t advanced management module 32r0835", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "msm", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.26.2.1.2" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.30" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3.0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "lotus protector for mail security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.80" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-471" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "2.2" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "12500(comware r7328p04", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "v7)" }, { "model": "aura presence services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "aura presence services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aspera console", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "2.0.1" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.3" }, { "model": "tivoli netcool/system service monitor fp9", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.4" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.5" }, { "model": "w", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.1.1" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "lotus protector for mail security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.8.1.0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.7.0" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.2" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "bladecenter -t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8730" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "cloudbridge", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "tivoli netcool/system service monitor fp5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "version control repository manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "pb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "nextscale n1200 enclosure fan power controller fhet13a-2.00", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "tivoli workload scheduler for applications fp01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "msm", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.56.5.1.0" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "flex system chassis management module 1.1.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5" }, { "model": "project openssl 1.0.1d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.9" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7989" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.10" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "bladecenter -ht", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8740" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.4" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "2.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aspera console", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "2.3" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "aspera faspex", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.7.7" }, { "model": "xcode", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.0" }, { "model": "switch series r2111p06", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "11900" }, { "model": "imc uam", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.5" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.8" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "packetshaper", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "9.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "aspera orchestrator", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "2.10" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.1.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3" }, { "model": "project openssl 1.0.0n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "insight control server provisioning 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.4.0" }, { "model": "sterling connect:enterprise http option", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "ei switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51300" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "y", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59200" }, { "model": "u", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "insight control", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.4.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.34" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "flex system chassis management module 2.5.3t", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "l", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3500-" }, { "model": "server migration pack", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "m220", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56002" }, { "model": "project openssl 1.0.0h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "flex system chassis management module 1.0.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli netcool/system service monitor fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "imc wsm", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aspera ondemand for amazon", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "msm", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.36.3.1.0" }, { "model": "sdk for node.js", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.9" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "aura system manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "project openssl 0.9.8o", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.2" }, { "model": "server migration pack", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1886" }, { "model": "project openssl 1.0.1b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl 1.0.0k", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3700-" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59000" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.0.5" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "msr2000", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "tivoli netcool/system service monitor fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "qradar siem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.3" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "tivoli netcool/system service monitor fp7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8677" }, { "model": "nextscale n1200 enclosure fan power controller fhet17a-2.02", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.2" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "malware analyzer g2", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.1" }, { "model": "f", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "nextscale n1200 enclosure fan power controller fhet24j-2.10", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aspera enterprise server", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.2" }, { "model": "project openssl 0.9.8s", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "qradar risk manager mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.2" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "switch series r1005p15", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "12900" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "office connect p", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18100" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "aspera orchestrator", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "norman shark industrial control system protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.0" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "norman shark network protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.2.3" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "netscaler service delivery appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "tivoli provisioning manager for os deployment", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "oneview", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.20" }, { "model": "matrix operating environment", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.10" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "infosphere master data management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.4" }, { "model": "nextscale n1200 enclosure fan power controller fhet24g-2.09", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "manager for sle sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "111.7" }, { "model": "studio onsite", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.3" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.8" }, { "model": "cloudsystem foundation", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.0" }, { "model": "office connect pl", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18100" }, { "model": "content analysis system", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "1.2.3.1" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "reporter\u0027s iso", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "9.4" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.0" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.05" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "systems insight manager 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "t", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.1" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "vsr1000 r0204p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.4" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.4" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.4" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.3" }, { "model": "flex system en6131 40gb ethernet switch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.4.1110" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-476" }, { "model": "switch series r2311p05", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5920" }, { "model": "aspera point to point", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.2" }, { "model": "insight control server provisioning", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "tivoli provisioning manager for images system edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x7.1.1.0" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.1" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "7.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "project openssl 1.0.1h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "ei switch series r3108p03", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5130" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" } ], "sources": [ { "db": "BID", "id": "70586" }, { "db": "CNNVD", "id": "CNNVD-201410-636" }, { "db": "NVD", "id": "CVE-2014-3567" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "132082" }, { "db": "PACKETSTORM", "id": "128921" }, { "db": "PACKETSTORM", "id": "128969" }, { "db": "PACKETSTORM", "id": "132081" } ], "trust": 0.6 }, "cve": "CVE-2014-3567", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2014-3567", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-3567", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201410-636", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2014-3567", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3567" }, { "db": "CNNVD", "id": "CNNVD-201410-636" }, { "db": "NVD", "id": "CVE-2014-3567" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. OpenSSL is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to crash the affected application, denying service to legitimate users. \nOpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. Implementations of OpenSSL that\nhave been compiled with OPENSSL_NO_SRTP defined are not affected. \n\nThis issue was reported to OpenSSL on 26th September 2014, based on an original\nissue and patch developed by the LibreSSL project. Further analysis of the issue\nwas performed by the OpenSSL team. \n\nThe fix was developed by the OpenSSL team. \n\nThis issue was reported to OpenSSL on 8th October 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\nhttps://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00\nhttps://www.openssl.org/~bodo/ssl-poodle.pdf\n\nSupport for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller. \n\nThis issue was reported to OpenSSL by Akamai Technologies on 14th October 2014. \n\nThe fix was developed by Akamai and the OpenSSL team. \n\n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20141015.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: openssl security update\nAdvisory ID: RHSA-2014:1652-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1652.html\nIssue date: 2014-10-16\nCVE Names: CVE-2014-3513 CVE-2014-3567 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that contain a backported patch to mitigate the\nCVE-2014-3566 issue and fix two security issues are now available for Red\nHat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary. \n\nThis update adds support for the TLS Fallback Signaling Cipher Suite Value\n(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade\nattacks against applications which re-connect using a lower SSL/TLS\nprotocol version when the initial connection indicating the highest\nsupported protocol version fails. \n\nThis can prevent a forceful downgrade of the communication to SSL 3.0. \nThe SSL 3.0 protocol was found to be vulnerable to the padding oracle\nattack when using block cipher suites in cipher block chaining (CBC) mode. \nThis issue is identified as CVE-2014-3566, and also known under the alias\nPOODLE. This SSL 3.0 protocol flaw will not be addressed in a future\nupdate; it is recommended that users configure their applications to\nrequire at least TLS protocol version 1.0 for secure communication. \n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1232123\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. A remote attacker could\nsend multiple specially crafted handshake messages to exhaust all available\nmemory of an SSL/TLS or DTLS server. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to mitigate the CVE-2014-3566 issue and correct\nthe CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,\nall services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\n\nppc64:\nopenssl-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-static-1.0.1e-30.el6_6.2.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nppc64:\nopenssl-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-static-1.0.1e-34.el7_0.6.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-static-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-static-1.0.1e-34.el7_0.6.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-3513.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3567.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/articles/1232123\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFUP940XlSAg2UNWIIRAhUYAJ4or1rZ25E0BXjTPyeDsN+keTz3twCdHDEz\nqY686VXQQ02SLq5vTvKfuHk=\n=McEc\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \nCorrected: 2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE)\n 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3)\n 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1)\n 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1)\n 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1)\n 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10)\n 2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE)\n 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3)\n 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13)\n 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20)\n 2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE)\n 2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17)\nCVE Name: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:http://security.FreeBSD.org/\u003e. Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2014-3513]. [CVE-2014-3567]. This\nprotocol weakness makes it possible for an attacker to obtain clear text\ndata through a padding-oracle attack. \n\nSome client applications (such as browsers) will reconnect using a\ndowngraded protocol to work around interoperability bugs in older\nservers. This could be exploited by an active man-in-the-middle to\ndowngrade connections to SSL 3.0 even if both sides of the connection\nsupport higher protocols. SSL 3.0 contains a number of weaknesses\nincluding POODLE [CVE-2014-3566]. \n\nOpenSSL has added support for TLS_FALLBACK_SCSV to allow applications\nto block the ability for a MITM attacker to force a protocol downgrade. \n\nWhen OpenSSL is configured with \"no-ssl3\" as a build option, servers\ncould accept and complete a SSL 3.0 handshake, and clients could be\nconfigured to send them. [CVE-2014-3568]. \n\nIII. \n[CVE-2014-3567]. \n\nAn active man-in-the-middle attacker can force a protocol downgrade\nto SSLv3 and exploit the weakness of SSLv3 to obtain clear text data\nfrom the connection. [CVE-2014-3566] [CVE-2014-3568]\n\nIV. Workaround\n\nNo workaround is available. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc\n# gpg --verify openssl-10.0.patch.asc\n\n[FreeBSD 9.3]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc\n# gpg --verify openssl-9.3.patch.asc\n\n[FreeBSD 8.4, 9.1 and 9.2]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in \u003cURL:http://www.FreeBSD.org/handbook/makeworld.html\u003e. \n\nRestart all deamons using the library, or reboot the system. \n\nVI. Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/8/ r273151\nreleng/8.4/ r273416\nstable/9/ r273151\nreleng/9.1/ r273415\nreleng/9.2/ r273415\nreleng/9.3/ r273415\nstable/10/ r273149\nreleng/10.0/ r273415\nreleng/10.1/ r273399\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:http://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2015-09-16-2 Xcode 7.0\n\nXcode 7.0 is now available and addresses the following:\n\nDevTools\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: An attacker may be able to bypass access restrictions\nDescription: An API issue existed in the apache configuration. This\nissue was addressed by updating header files to use the latest\nversion. \nCVE-ID\nCVE-2015-3185 : Branko Aibej of the Apache Software Foundation\n\nIDE Xcode Server\nAvailable for: OS X Yosemite 10.10 or later\nImpact: An attacker may be able to access restricted parts of the\nfilesystem\nDescription: A comparison issue existed in the node.js send module\nprior to version 0.8.4. This issue was addressed by upgrading to\nversion 0.12.3. \nCVE-ID\nCVE-2014-6394 : Ilya Kantor\n\nIDE Xcode Server\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: Multiple vulnerabilties in OpenSSL\nDescription: Multiple vulnerabilties existed in the node.js OpenSSL\nmodule prior to version 1.0.1j. \nCVE-ID\nCVE-2014-3513\nCVE-2014-3566\nCVE-2014-3567\nCVE-2014-3568\n\nIDE Xcode Server\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: An attacker with a privileged network position may be able\nto inspect traffic to Xcode Server\nDescription: Connections to Xcode Server may have been made without\nencryption. This issue was addressed through improved network\nconnection logic. \nCVE-ID\nCVE-2015-5910 : an anonymous researcher\n\nIDE Xcode Server\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: Build notifications may be sent to unintended recipients\nDescription: An access issue existed in the handling of repository\nemail lists. This issue was addressed through improved validation. \nCVE-ID\nCVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of\nAnchorfree\n\nsubversion\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: Multiple vulnerabilities existed in svn versions prior to\n1.7.19\nDescription: Multiple vulnerabilities existed in svn versions prior\nto 1.7.19. These issues were addressed by updating svn to version\n1.7.20. \nCVE-ID\nCVE-2015-0248\nCVE-2015-0251\n\n\nXcode 7.0 may be obtained from:\nhttps://developer.apple.com/xcode/downloads/\n\nTo check that the Xcode has been updated:\n\n* Select Xcode in the menu bar\n* Select About Xcode\n* The version after applying this update will be \"7.0\". Summary\n\n VMware vCenter Server, ESXi, Workstation, Player and Fusion address\n several security issues. Relevant Releases\n\n VMware Workstation 10.x prior to version 10.0.5\n \n VMware Player 6.x prior to version 6.0.5\n\n VMware Fusion 7.x prior to version 7.0.1\n VMware Fusion 6.x prior to version 6.0.5\n\n vCenter Server 5.5 prior to Update 2d\n\n ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG\n ESXi 5.1 without patch ESXi510-201404101-SG\n ESXi 5.0 without patch ESXi500-201405101-SG\n\n3. Problem Description \n\n a. VMware ESXi, Workstation, Player, and Fusion host privilege\n escalation vulnerability\n\n VMware ESXi, Workstation, Player and Fusion contain an arbitrary \n file write issue. Exploitation this issue may allow for privilege\n escalation on the host. \n\n The vulnerability does not allow for privilege escalation from \n the guest Operating System to the host or vice-versa. This means\n that host memory can not be manipulated from the Guest Operating\n System. \n\n Mitigation\n \n For ESXi to be affected, permissions must have been added to ESXi\n (or a vCenter Server managing it) for a virtual machine \n administrator role or greater. \n\n VMware would like to thank Shanon Olsson for reporting this issue to\n us through JPCERT. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2014-8370 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any not affected\n Fusion 6.x any 6.0.5\n\n ESXi 5.5 ESXi ESXi550-201403102-SG\n ESXi 5.1 ESXi ESXi510-201404101-SG \n ESXi 5.0 ESXi ESXi500-201405101-SG\n\n b. VMware Workstation, Player, and Fusion Denial of Service \n vulnerability\n\n VMware Workstation, Player, and Fusion contain an input validation \n issue in the Host Guest File System (HGFS). This issue may allow\n for a Denial of Service of the Guest Operating system. \n\n VMware would like to thank Peter Kamensky from Digital Security for \n reporting this issue to us. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2015-1043 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any 7.0.1\n Fusion 6.x any 6.0.5\n\n c. VMware ESXi, Workstation, and Player Denial of Service \n vulnerability\n\n VMware ESXi, Workstation, and Player contain an input\n validation issue in VMware Authorization process (vmware-authd). \n This issue may allow for a Denial of Service of the host. On \n VMware ESXi and on Workstation running on Linux the Denial of\n Service would be partial. \n\n VMware would like to thank Dmitry Yudin @ret5et for reporting\n this issue to us through HP\u0027s Zero Day Initiative. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2015-1044 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any not affected\n Fusion 6.x any not affected\n\n ESXi 5.5 ESXi ESXi550-201501101-SG\n ESXi 5.1 ESXi ESXi510-201410101-SG\n ESXi 5.0 ESXi not affected\n\n d. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2014-3513, CVE-2014-3567, \n CVE-2014-3566 (\"POODLE\") and CVE-2014-3568 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n vCenter Server 5.5 any Update 2d*\n vCenter Server 5.1 any patch pending\n vCenter Server 5.0 any patch pending\n\n ESXi 5.5 ESXi ESXi550-201501101-SG \n ESXi 5.1 ESXi patch pending\n ESXi 5.0 ESXi patch pending\n\n * The VMware vCenter 5.5 SSO component will be \n updated in a later release\n \n e. Update to ESXi libxml2 package\n\n The libxml2 library is updated to version libxml2-2.7.6-17\n to resolve a security issue. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2014-3660 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n ESXi 5.5 ESXi ESXi550-201501101-SG \n ESXi 5.1 ESXi patch pending\n ESXi 5.0 ESXi patch pending\n \n4. Solution\n\n Please review the patch/release notes for your product and \n version and verify the checksum of your downloaded file. \n\n VMware Workstation 10.x\n -------------------------------- \n https://www.vmware.com/go/downloadworkstation \n\n VMware Player 6.x\n -------------------------------- \n https://www.vmware.com/go/downloadplayer \n\n VMware Fusion 7.x and 6.x\n -------------------------------- \n https://www.vmware.com/go/downloadplayer \n\n vCenter Server\n ----------------------------\n Downloads and Documentation: \n https://www.vmware.com/go/download-vsphere \n\n ESXi 5.5 Update 2d\n ----------------------------\n File: update-from-esxi5.5-5.5_update01.zip\n md5sum: 5773844efc7d8e43135de46801d6ea25\n sha1sum: 6518355d260e81b562c66c5016781db9f077161f\n http://kb.vmware.com/kb/2065832\n update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG\n\n ESXi 5.5\n ----------------------------\n File: ESXi550-201501001.zip\n md5sum: b0f2edd9ad17d0bae5a11782aaef9304\n sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1\n http://kb.vmware.com/kb/2099265\n ESXi550-201501001.zip contains ESXi550-201501101-SG\n\n ESXi 5.1\n ----------------------------\n File: ESXi510-201404001.zip\n md5sum: 9dc3c9538de4451244a2b62d247e52c4\n sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66\n http://kb.vmware.com/kb/2070666\n ESXi510-201404001 contains ESXi510-201404101-SG\n\n ESXi 5.0\n ----------------------------\n File: ESXi500-201405001.zip\n md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d\n sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5\n http://kb.vmware.com/kb/2075521\n ESXi500-201405001 contains ESXi500-201405101-SG\n \n5. Change log\n\n 2015-01-27 VMSA-2015-0001\n Initial security advisory in conjunction with the release of VMware\n Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d\n and, ESXi 5.5 Patches released on 2015-01-27. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce at lists.vmware.com\n bugtraq at securityfocus.com\n fulldisclosure at seclists.org\n\n E-mail: security at vmware.com\n PGP key at: http://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n Consolidated list of VMware Security Advisories\n http://kb.vmware.com/kb/2078735\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Support Phases\n https://www.vmware.com/support/policies/lifecycle.html\n \n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2015 VMware Inc. All rights reserved. The HP Insight Control 7.2.3\nUpdate kit applicable to HP Insight Control 7.2.x installations is available\nat the following location:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=HPICE\n\nNOTE: Please read the readme.txt file before proceeding with the\ninstallation. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n https://www.openssl.org/news/secadv_20141015.txt\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 054c36eb1d59a0556ab17a1627f869d2 mbs1/x86_64/lib64openssl1.0.0-1.0.0o-1.mbs1.x86_64.rpm\n aaff926dab60e6d5635afde92edd9c91 mbs1/x86_64/lib64openssl-devel-1.0.0o-1.mbs1.x86_64.rpm\n 27a964cb0697f9a8d0c487db11928cca mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0o-1.mbs1.x86_64.rpm\n 012ccb3cd7acc23e33666290036d0ec9 mbs1/x86_64/lib64openssl-static-devel-1.0.0o-1.mbs1.x86_64.rpm\n dba56f5d00437cfb90c7fecaa7dc2e86 mbs1/x86_64/openssl-1.0.0o-1.mbs1.x86_64.rpm \n 89ba517c11cc244d57ecb98ec4be4140 mbs1/SRPMS/openssl-1.0.0o-1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. Relevant releases/architectures:\n\nRHEV Hypervisor for RHEL-6 - noarch\n\n3. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. \n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions. \n\nA heap-based buffer overflow was found in glibc\u0027s\n__nss_hostname_digits_dots() function, which is used by the gethostbyname()\nand gethostbyname2() glibc function calls. A remote attacker able to make\nan application call either of these functions could use this flaw to\nexecute arbitrary code with the permissions of the user running the\napplication. (CVE-2015-0235)\n\nA race condition flaw was found in the way the Linux kernel\u0027s KVM subsystem\nhandled PIT (Programmable Interval Timer) emulation. A guest user who has \naccess to the PIT I/O ports could use this flaw to crash the host. \nA man-in-the-middle attacker could use this flaw to force a TLS/SSL server\nusing OpenSSL to use TLS 1.0, even if both the client and the server\nsupported newer protocol versions. (CVE-2014-3567)\n\nIt was found that the Linux kernel\u0027s KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. \nHP BladeSystem c-Class Onboard Administrator (OA) 4.30 and earlier. \n\nGo to\nhttp://www.hp.com/go/oa\n\nSelect \"Onboard Administrator Firmware\"\nSelect product name as \"\"HP BLc3000 Onboard Administrator Option\" or \"HP\nBLc7000 Onboard Administrator Option\"\nSelect the operating system from the list of choices\nSelect Firmware version 4.40 for download\nRefer to the HP BladeSystem Onboard Administrator User Guide for steps to\nupdate the Onboard Administrator firmware. \n\nRelease Date: 2014-10-28\nLast Updated: 2014-10-28\n\nPotential Security Impact: Remote Denial of Service (DoS), unauthorized\naccess, man-in-the-middle (MitM) attack\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX running\nOpenSSL. \n\nThis is the SSLv3 vulnerability known as \"Padding Oracle on Downgraded Legacy\nEncryption\" also known as \"Poodle\", which could be exploited remotely to\nallow disclosure of information. \n\nReferences:\n\nCVE-2014-3566 Man-in-th-Middle (MitM) attack\nCVE-2014-3567 Remote Unauthorized Access\nCVE-2014-3568 Remote Denial of Service (DoS)\nSSRT101767\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.11, B.11.23, B.11.31 running OpenSSL versions before v0.9.8zc\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1\nCVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following updates to resolve these vulnerabilities. The\nupdates are available from the following ftp site. \n\nftp://ssl098zc:Secure12@ftp.usa.hp.com\n\nUser name: ssl098zc Password: (NOTE: Case sensitive) Secure12\n\nHP-UX Release\n HP-UX OpenSSL version\n\nB.11.11 (11i v1)\n A.00.09.08zc.001_HP-UX_B.11.11_32+64.depot\n\nB.11.23 (11i v2)\n A.00.09.08zc.002_HP-UX_B.11.23_IA-PA.depot\n\nB.11.31 (11i v3)\n A.00.09.08zc.003_HP-UX_B.11.31_IA-PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nInstall OpenSSL A.00.09.08zc or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zc.001 or subsequent\n\nHP-UX B.11.23\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zc.002 or subsequent\n\nHP-UX B.11.31\n==================\nopenssl.OPENSSL-CER\nopenssl.OPENSSL-CONF\nopenssl.OPENSSL-DOC\nopenssl.OPENSSL-INC\nopenssl.OPENSSL-LIB\nopenssl.OPENSSL-MAN\nopenssl.OPENSSL-MIS\nopenssl.OPENSSL-PRNG\nopenssl.OPENSSL-PVT\nopenssl.OPENSSL-RUN\nopenssl.OPENSSL-SRC\naction: install revision A.00.09.08zc.003 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 28 October 2014 Initial release\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners", "sources": [ { "db": "NVD", "id": "CVE-2014-3567" }, { "db": "BID", "id": "70586" }, { "db": "PACKETSTORM", "id": "128969" }, { "db": "PACKETSTORM", "id": "169664" }, { "db": "PACKETSTORM", "id": "128793" }, { "db": "PACKETSTORM", "id": "128706" }, { "db": "PACKETSTORM", "id": "128808" }, { "db": "PACKETSTORM", "id": "133617" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "VULMON", "id": "CVE-2014-3567" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "132082" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "128838" }, { "db": "PACKETSTORM", "id": "130241" }, { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "128921" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3567", "trust": 3.4 }, { "db": "BID", "id": "70586", "trust": 1.4 }, { "db": "SECUNIA", "id": "62124", "trust": 1.1 }, { "db": "SECUNIA", "id": "62030", "trust": 1.1 }, { "db": "SECUNIA", "id": "61058", "trust": 1.1 }, { "db": "SECUNIA", "id": "59627", "trust": 1.1 }, { "db": "SECUNIA", "id": "61819", "trust": 1.1 }, { "db": "SECUNIA", "id": "61130", "trust": 1.1 }, { "db": "SECUNIA", "id": "61207", "trust": 1.1 }, { "db": "SECUNIA", "id": "61837", "trust": 1.1 }, { "db": "SECUNIA", "id": "61990", "trust": 1.1 }, { "db": "SECUNIA", "id": "61298", "trust": 1.1 }, { "db": "SECUNIA", "id": "62070", "trust": 1.1 }, { "db": "SECUNIA", "id": "61073", "trust": 1.1 }, { "db": "SECUNIA", "id": "61959", "trust": 1.1 }, { "db": "SECTRACK", "id": "1031052", "trust": 1.1 }, { "db": "MCAFEE", "id": "SB10091", "trust": 1.1 }, { "db": "AUSCERT", "id": "ESB-2022.0696", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2148", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201410-636", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2014-3567", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131306", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130241", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128838", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131014", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132082", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130144", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128921", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128969", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132081", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133617", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128808", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128706", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128793", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169664", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3567" }, { "db": "BID", "id": "70586" }, { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "130241" }, { "db": "PACKETSTORM", "id": "128838" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "132082" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "128921" }, { "db": "PACKETSTORM", "id": "128969" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "PACKETSTORM", "id": "133617" }, { "db": "PACKETSTORM", "id": "128808" }, { "db": "PACKETSTORM", "id": "128706" }, { "db": "PACKETSTORM", "id": "128793" }, { "db": "PACKETSTORM", "id": "169664" }, { "db": "CNNVD", "id": "CNNVD-201410-636" }, { "db": "NVD", "id": "CVE-2014-3567" } ] }, "id": "VAR-201410-1144", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.3482142825 }, "last_update_date": "2024-09-17T20:38:44.918000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "openssl-1.0.0o", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52068" }, { "title": "openssl-0.9.8zc", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52067" }, { "title": "openssl-1.0.1j", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52069" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2014/10/15/openssl_ddos_vulns/" }, { "title": "Red Hat: Critical: rhev-hypervisor6 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20150126 - Security Advisory" }, { "title": "Red Hat: CVE-2014-3567", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2014-3567" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2385-1" }, { "title": "Debian Security Advisories: DSA-3053-1 openssl -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=89bdef3607a7448566a930eca0e94cb3" }, { "title": "Amazon Linux AMI: ALAS-2014-427", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-427" }, { "title": "Symantec Security Advisories: SA87 : OpenSSL Security Advisory 15-Oct-2014", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=374cff59719675d8235f907c21b99bfc" }, { "title": "Tenable Security Advisories: [R7] OpenSSL \u002720141015\u0027 Advisory Affects Tenable Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2014-11" }, { "title": "IBM: IBM Security Bulletin: Fabric OS firmware for Brocade 8Gb SAN Switch Module for BladeCenter is affected by vulnerabilities in OpenSSL and OpenSSH", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=b7f5b1e7edcafce07f28205855d4db49" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4a692d6d60aa31507cb101702b494c51" }, { "title": "Splunk Security Announcements: Splunk Enterprise versions 6.0.7 and 5.0.11 address three vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=splunk_security_announcements\u0026qid=555e6256ba536e4a20d40e659e367839" }, { "title": "Splunk Security Announcements: Splunk Enterprise 6.1.5 addresses two vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=splunk_security_announcements\u0026qid=dfed8c47fbdf5e7bb5fbbdd725bdfb67" }, { "title": "Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=eb059834b7f24e2562bcf592b6d0afbc" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=459961024c4bdce7bb3a1a40a65a6f2e" }, { "title": "rhsecapi", "trust": 0.1, "url": "https://github.com/RedHatOfficial/rhsecapi " }, { "title": "cve-pylib", "trust": 0.1, "url": "https://github.com/RedHatProductSecurity/cve-pylib " } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3567" }, { "db": "CNNVD", "id": "CNNVD-201410-636" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2014-3567" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "trust": 1.4, "url": "http://www.splunk.com/view/sp-caaanst" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "trust": 1.4, "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "trust": 1.4, "url": "https://support.citrix.com/article/ctx216642" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3567" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/70586" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2014-1652.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2014-1692.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2015-0126.html" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2014:203" }, { "trust": 1.1, "url": "http://www.debian.org/security/2014/dsa-3053" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2385-1" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61130" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61073" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62070" }, { "trust": 1.1, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031052" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" }, { "trust": 1.1, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-015.txt.asc" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61207" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62030" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61819" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61058" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61990" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61837" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62124" }, { "trust": 1.1, "url": "http://support.apple.com/ht204244" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html" }, { "trust": 1.1, "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888" }, { "trust": 1.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10091" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61959" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61298" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59627" }, { "trust": 1.1, "url": "http://advisories.mageia.org/mgasa-2014-0416.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/sep/msg00002.html" }, { "trust": 1.1, "url": "https://support.apple.com/ht205217" }, { "trust": 1.1, "url": "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=7fd4ce6a997be5f5c9e744ac527725c2850de203" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3513" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3566" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3568" }, { "trust": 0.6, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.6, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.6, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0696" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10887855" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2148/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2014-3567" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21687676" }, { "trust": 0.3, "url": "http://www.openssl.org" }, { "trust": 0.3, "url": "https://bto.bluecoat.com/security-advisory/sa87" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690537" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959161" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21691210" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/may/158" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/may/156" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/may/157" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04574073" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/may/159" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/feb/151" }, { "trust": 0.3, "url": "https://www.freebsd.org/security/advisories/freebsd-sa-14:23.openssl.asc" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04492722" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692" }, { "trust": 0.3, "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04616259" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/apr/35" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04624296" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04533567 " }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04533567 " }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686792" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098196" }, { "trust": 0.3, "url": "https://support.asperasoft.com/entries/103000206-security-advisory-cve-2014-3513-cve-2014-3566-poodle-cve-2014-3567-cve-2014-3568" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097074" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21884030" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959134" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21691005" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21688284" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697995" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697165" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687801" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21689482" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097375" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689101" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700275" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098265" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021548" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097587" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701452" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098251" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098105" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693662" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689347" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097159" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097913" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21697162" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097867" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097911" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097807" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098586" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689743" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020593" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691140" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2015-0001.html " }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101009000" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699200" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700489" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687863" }, { "trust": 0.3, "url": "www-01.ibm.com/support/docview.wss?uid=ssg1s1005003" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3511" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3508" }, { "trust": 0.2, "url": "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3509" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-5139" }, { "trust": 0.2, "url": "https://www.hp.com/go/swa" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/1232123" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/399.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2015:0126" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2385-1/" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=37192" }, { "trust": 0.1, "url": "http://www.hp.com/go/oa" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0235" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3611" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/ht" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3646" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3611" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3511" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3645" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3645" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3646" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-0235" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_" }, { "trust": 0.1, "url": "http://www.hp.com/go/insightupdates" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1044" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1044" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2078735" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2070666" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1043" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8370" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2075521" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2065832" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadplayer" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3660" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1043" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadworkstation" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3660" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2099265" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8370" }, { "trust": 0.1, "url": "https://www.vmware.com/go/download-vsphere" }, { "trust": 0.1, "url": "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0248" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5910" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3185" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://developer.apple.com/xcode/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6394" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0251" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5909" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-8.4.patch" }, { "trust": 0.1, "url": "http://www.freebsd.org/handbook/makeworld.html\u003e." }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-9.3.patch.asc" }, { "trust": 0.1, "url": "http://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513\u003e" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-10.0.patch.asc" }, { "trust": 0.1, "url": "http://security.freebsd.org/\u003e." }, { "trust": 0.1, "url": "http://security.freebsd.org/advisories/freebsd-sa-14:23.openssl.asc\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566\u003e" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-9.3.patch" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-10.0.patch" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568\u003e" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-8.4.patch.asc" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567\u003e" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3513.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3567.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3513" }, { "trust": 0.1, "url": "https://www.openssl.org/~bodo/ssl-poodle.pdf" }, { "trust": 0.1, "url": "https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00" }, { "trust": 0.1, "url": "https://www.openssl.org/about/secpolicy.html" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3567" }, { "db": "BID", "id": "70586" }, { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "130241" }, { "db": "PACKETSTORM", "id": "128838" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "132082" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "128921" }, { "db": "PACKETSTORM", "id": "128969" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "PACKETSTORM", "id": "133617" }, { "db": "PACKETSTORM", "id": "128808" }, { "db": "PACKETSTORM", "id": "128706" }, { "db": "PACKETSTORM", "id": "128793" }, { "db": "PACKETSTORM", "id": "169664" }, { "db": "CNNVD", "id": "CNNVD-201410-636" }, { "db": "NVD", "id": "CVE-2014-3567" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2014-3567" }, { "db": "BID", "id": "70586" }, { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "130241" }, { "db": "PACKETSTORM", "id": "128838" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "132082" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "128921" }, { "db": "PACKETSTORM", "id": "128969" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "PACKETSTORM", "id": "133617" }, { "db": "PACKETSTORM", "id": "128808" }, { "db": "PACKETSTORM", "id": "128706" }, { "db": "PACKETSTORM", "id": "128793" }, { "db": "PACKETSTORM", "id": "169664" }, { "db": "CNNVD", "id": "CNNVD-201410-636" }, { "db": "NVD", "id": "CVE-2014-3567" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-19T00:00:00", "db": "VULMON", "id": "CVE-2014-3567" }, { "date": "2014-10-15T00:00:00", "db": "BID", "id": "70586" }, { "date": "2015-04-06T19:11:05", "db": "PACKETSTORM", "id": "131306" }, { "date": "2015-02-04T21:32:57", "db": "PACKETSTORM", "id": "130241" }, { "date": "2014-10-24T20:07:16", "db": "PACKETSTORM", "id": "128838" }, { "date": "2015-03-25T00:42:25", "db": "PACKETSTORM", "id": "131014" }, { "date": "2015-05-29T23:37:23", "db": "PACKETSTORM", "id": "132082" }, { "date": "2015-01-28T18:22:00", "db": "PACKETSTORM", "id": "130144" }, { "date": "2014-10-31T23:08:29", "db": "PACKETSTORM", "id": "128921" }, { "date": "2014-11-04T17:22:00", "db": "PACKETSTORM", "id": "128969" }, { "date": "2015-05-29T23:37:11", "db": "PACKETSTORM", "id": "132081" }, { "date": "2015-09-19T15:31:48", "db": "PACKETSTORM", "id": "133617" }, { "date": "2014-10-22T19:54:29", "db": "PACKETSTORM", "id": "128808" }, { "date": "2014-10-17T00:03:21", "db": "PACKETSTORM", "id": "128706" }, { "date": "2014-10-22T18:52:41", "db": "PACKETSTORM", "id": "128793" }, { "date": "2014-10-15T12:12:12", "db": "PACKETSTORM", "id": "169664" }, { "date": "2014-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-636" }, { "date": "2014-10-19T01:55:13.933000", "db": "NVD", "id": "CVE-2014-3567" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2014-3567" }, { "date": "2016-09-09T15:00:00", "db": "BID", "id": "70586" }, { "date": "2022-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-636" }, { "date": "2023-11-07T02:20:13.200000", "db": "NVD", "id": "CVE-2014-3567" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "130241" }, { "db": "CNNVD", "id": "CNNVD-201410-636" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL Memory leak denial of service vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-636" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-636" } ], "trust": 0.6 } }
ghsa-5cmf-xwq3-4rj3
Vulnerability from github
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
{ "affected": [], "aliases": [ "CVE-2014-3567" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-10-19T01:55:00Z", "severity": "HIGH" }, "details": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.", "id": "GHSA-5cmf-xwq3-4rj3", "modified": "2022-05-17T19:57:38Z", "published": "2022-05-17T19:57:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567" }, { "type": "WEB", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "type": "WEB", "url": "https://support.apple.com/HT205217" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX216642" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "type": "WEB", "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "type": "WEB", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-0126.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/59627" }, { "type": "WEB", "url": "http://secunia.com/advisories/61058" }, { "type": "WEB", "url": "http://secunia.com/advisories/61073" }, { "type": "WEB", "url": "http://secunia.com/advisories/61130" }, { "type": "WEB", "url": "http://secunia.com/advisories/61207" }, { "type": "WEB", "url": "http://secunia.com/advisories/61298" }, { "type": "WEB", "url": "http://secunia.com/advisories/61819" }, { "type": "WEB", "url": "http://secunia.com/advisories/61837" }, { "type": "WEB", "url": "http://secunia.com/advisories/61959" }, { "type": "WEB", "url": "http://secunia.com/advisories/61990" }, { "type": "WEB", "url": "http://secunia.com/advisories/62030" }, { "type": "WEB", "url": "http://secunia.com/advisories/62070" }, { "type": "WEB", "url": "http://secunia.com/advisories/62124" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "type": "WEB", "url": "http://support.apple.com/HT204244" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-3053" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/70586" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1031052" }, { "type": "WEB", "url": "http://www.splunk.com/view/SP-CAAANST" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2385-1" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2014-3567
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-3567", "description": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.", "id": "GSD-2014-3567", "references": [ "https://www.suse.com/security/cve/CVE-2014-3567.html", "https://www.debian.org/security/2014/dsa-3053", "https://access.redhat.com/errata/RHSA-2015:0126", "https://access.redhat.com/errata/RHSA-2014:1692", "https://access.redhat.com/errata/RHSA-2014:1652", "https://ubuntu.com/security/CVE-2014-3567", "https://advisories.mageia.org/CVE-2014-3567.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-3567.html", "https://linux.oracle.com/cve/CVE-2014-3567.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-3567" ], "details": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.", "id": "GSD-2014-3567", "modified": "2023-12-13T01:22:53.113202Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3567", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBOV03227", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", "refsource": "CONFIRM", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "HPSBHF03300", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "openSUSE-SU-2014:1331", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "HPSBUX03162", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "61130", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61130" }, { "name": "https://www.openssl.org/news/secadv_20141015.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "1031052", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031052" }, { "name": "62070", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62070" }, { "name": "70586", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70586" }, { "name": "61073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61073" }, { "name": "USN-2385-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "HPSBMU03304", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "GLSA-201412-39", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "DSA-3053", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3053" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03223", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "HPSBMU03260", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "https://support.apple.com/HT205217", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205217" }, { "name": "SSRT101779", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "name": "openSUSE-SU-2016:0640", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "APPLE-SA-2015-09-16-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "SUSE-SU-2014:1357", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "NetBSD-SA2014-015", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "name": "http://www.splunk.com/view/SP-CAAANST", "refsource": "CONFIRM", "url": "http://www.splunk.com/view/SP-CAAANST" }, { "name": "61837", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61837" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "url": "http://support.apple.com/HT204244" }, { "name": "SSRT101767", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "61207", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61207" }, { "name": "RHSA-2014:1652", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "62124", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62124" }, { "name": "59627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59627" }, { "name": "SSRT101894", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "61298", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61298" }, { "name": "HPSBMU03263", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "SUSE-SU-2014:1361", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" }, { "name": "HPSBMU03296", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "61990", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61990" }, { "name": "61959", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61959" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "name": "http://advisories.mageia.org/MGASA-2014-0416.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "HPSBMU03267", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "HPSBMU03261", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "RHSA-2015:0126", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0126.html" }, { "name": "61058", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61058" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "MDVSA-2014:203", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "62030", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62030" }, { "name": "https://support.citrix.com/article/CTX216642", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX216642" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "61819", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61819" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "RHSA-2014:1692", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.9.8zb", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3567" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203" }, { "name": "https://www.openssl.org/news/secadv_20141015.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "70586", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/70586" }, { "name": "MDVSA-2014:203", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:203" }, { "name": "RHSA-2014:1652", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "DSA-3053", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-3053" }, { "name": "HPSBUX03162", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141477196830952\u0026w=2" }, { "name": "RHSA-2014:1692", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" }, { "name": "openSUSE-SU-2014:1331", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "name": "USN-2385-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "http://advisories.mageia.org/MGASA-2014-0416.html", "refsource": "CONFIRM", "tags": [], "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "59627", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59627" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", "refsource": "CONFIRM", "tags": [], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "61298", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61298" }, { "name": "61959", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61959" }, { "name": "SUSE-SU-2014:1357", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "name": "61130", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61130" }, { "name": "61073", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61073" }, { "name": "62070", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62070" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", "refsource": "CONFIRM", "tags": [], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "name": "1031052", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1031052" }, { "name": "SUSE-SU-2014:1361", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" }, { "name": "NetBSD-SA2014-015", "refsource": "NETBSD", "tags": [], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "name": "61207", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61207" }, { "name": "62030", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62030" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "61819", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61819" }, { "name": "61058", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61058" }, { "name": "61990", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61990" }, { "name": "61837", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61837" }, { "name": "62124", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62124" }, { "name": "http://www.splunk.com/view/SP-CAAANST", "refsource": "CONFIRM", "tags": [], "url": "http://www.splunk.com/view/SP-CAAANST" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "http://support.apple.com/HT204244", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/HT204244" }, { "name": "APPLE-SA-2015-01-27-4", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "name": "GLSA-201412-39", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "HPSBOV03227", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142103967620673\u0026w=2" }, { "name": "HPSBMU03260", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "RHSA-2015:0126", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0126.html" }, { "name": "HPSBMU03267", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "SSRT101868", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBMU03304", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "HPSBMU03296", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "HPSBHF03300", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "https://support.apple.com/HT205217", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT205217" }, { "name": "APPLE-SA-2015-09-16-2", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03261", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "HPSBMU03223", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "HPSBMU03263", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "openSUSE-SU-2016:0640", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091", "refsource": "CONFIRM", "tags": [], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "https://support.citrix.com/article/CTX216642", "refsource": "CONFIRM", "tags": [], "url": "https://support.citrix.com/article/CTX216642" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-11-15T02:29Z", "publishedDate": "2014-10-19T01:55Z" } } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.