Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-0224
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:39.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "59342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59342" }, { "name": "59669", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59669" }, { "name": "59525", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59525" }, { "name": "HPSBMU03071", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2" }, { "name": "59004", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59004" }, { "name": "59530", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59530" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" }, { "name": "59824", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59824" }, { "name": "59282", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59282" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015300" }, { "name": "59215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59215" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "name": "59990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59990" }, { "name": "59264", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59264" }, { "name": "59454", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59454" }, { "name": "58492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58492" }, { "name": "59186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59186" }, { "name": "59188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59188" }, { "name": "59126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59126" }, { "name": "HPSBMU03078", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2" }, { "name": "HPSBMU03089", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015264" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" }, { "name": "59306", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59306" }, { "name": "RHSA-2014:0627", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0627.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "name": "HPSBGN03068", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2" }, { "name": "RHSA-2014:0626", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0626.html" }, { "name": "59190", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59190" }, { "name": "58639", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58639" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877" }, { "name": "59446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59446" }, { "name": "59529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59529" }, { "name": "59445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59445" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "59589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59589" }, { "name": "59894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59894" }, { "name": "59325", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59325" }, { "name": "59354", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59354" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" }, { "name": "HPSBUX03046", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "61254", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61254" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" }, { "name": "59447", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59447" }, { "name": "1031594", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031594" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E" }, { "name": "59223", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59223" }, { "name": "58743", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58743" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "58719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58719" }, { "name": "59449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59449" }, { "name": "59132", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59132" }, { "name": "SSRT101818", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" }, { "name": "HPSBST03098", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2" }, { "name": "HPSBMU03058", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2" }, { "name": "59442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59442" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946" }, { "name": "HPSBOV03047", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2" }, { "name": "HPSBST03195", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" }, { "name": "59441", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59441" }, { "name": "HPSBMU03074", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf" }, { "name": "HPSBMU03094", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://filezilla-project.org/versions.php?type=server" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" }, { "name": "60567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60567" }, { "name": "59189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59189" }, { "name": "59368", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59368" }, { "name": "MDVSA-2014:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106" }, { "name": "59142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59142" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" }, { "name": "58742", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58742" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670" }, { "name": "RHSA-2014:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0624.html" }, { "name": "59602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59602" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kerio.com/support/kerio-control/release-history" }, { "name": "59300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59300" }, { "name": "58930", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58930" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" }, { "name": "61815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61815" }, { "name": "58667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58667" }, { "name": "GLSA-201407-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" }, { "name": "59191", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59191" }, { "name": "59284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59284" }, { "name": "59444", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59444" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783" }, { "name": "59365", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59365" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" }, { "name": "59305", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59305" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" }, { "name": "59483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59483" }, { "name": "58385", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58385" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "59495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59495" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" }, { "name": "FEDORA-2014-9308", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html" }, { "name": "58945", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58945" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" }, { "name": "HPSBST03106", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2" }, { "name": "59659", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59659" }, { "name": "59440", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59440" }, { "name": "openSUSE-SU-2016:0640", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "59429", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59429" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "59655", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59655" }, { "name": "59370", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59370" }, { "name": "59827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59827" }, { "name": "58660", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58660" }, { "name": "59163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59163" }, { "name": "58716", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58716" }, { "name": "59055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59055" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" }, { "name": "59437", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59437" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754" }, { "name": "60176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60176" }, { "name": "HPSBPI03107", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2" }, { "name": "59101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx" }, { "name": "59374", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59374" }, { "name": "59063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59063" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://discussions.nessus.org/thread/7517" }, { "name": "59310", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59310" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" }, { "name": "HPSBMU03216", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" }, { "name": "IV61506", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506" }, { "name": "59502", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59502" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.splunk.com/view/SP-CAAAM2D" }, { "name": "59878", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59878" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fortiguard.com/advisory/FG-IR-14-018/" }, { "name": "SUSE-SU-2015:0743", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" }, { "name": "HPSBMU03101", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793" }, { "name": "59214", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59214" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356" }, { "name": "HPSBHF03088", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2" }, { "name": "HPSBMU03057", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.citrix.com/article/CTX140876" }, { "name": "59167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59167" }, { "name": "59120", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59120" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172" }, { "name": "HPSBMU03053", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2" }, { "name": "59380", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59380" }, { "name": "MDVSA-2014:105", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105" }, { "name": "59460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59460" }, { "name": "59506", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59506" }, { "name": "58939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58939" }, { "name": "SSRT101590", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "59661", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59661" }, { "name": "59514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59514" }, { "name": "59677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59677" }, { "name": "RHSA-2014:0630", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0630.html" }, { "name": "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195" }, { "name": "RHSA-2014:0632", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0632.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" }, { "name": "58745", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58745" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" }, { "name": "59438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59438" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" }, { "name": "58714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58714" }, { "name": "HPSBGN03050", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2" }, { "name": "openSUSE-SU-2015:0229", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ccsinjection.lepidum.co.jp" }, { "name": "59435", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59435" }, { "name": "HPSBHF03052", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openssl.org/news/secadv_20140605.txt" }, { "name": "58615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58615" }, { "name": "HPSBST03265", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" }, { "name": "59231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59231" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671" }, { "name": "SUSE-SU-2015:0578", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6443" }, { "name": "59211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59211" }, { "name": "58433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58433" }, { "name": "60066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60066" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/site/blogs/766093/posts/908133" }, { "name": "59301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59301" }, { "name": "60522", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60522" }, { "name": "59784", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59784" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA80" }, { "name": "HPSBST03097", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2" }, { "name": "20140607 Re: More OpenSSL issues", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Jun/38" }, { "name": "HPSBMU03076", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" }, { "name": "59135", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59135" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" }, { "name": "58759", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58759" }, { "name": "59093", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59093" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://puppetlabs.com/security/cve/cve-2014-0224" }, { "name": "59192", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59192" }, { "name": "FEDORA-2014-9301", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html" }, { "name": "HPSBMU03062", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2" }, { "name": "58579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58579" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf" }, { "name": "59040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59040" }, { "name": "HPSBMU03056", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2" }, { "name": "59175", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59175" }, { "name": "60819", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60819" }, { "name": "HPSBMU03051", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2" }, { "name": "59666", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59666" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" }, { "name": "58128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58128" }, { "name": "HPSBMU03055", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2" }, { "name": "59413", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59413" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" }, { "name": "59721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59721" }, { "name": "HPSBHF03145", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756" }, { "name": "RHSA-2014:0680", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0680.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" }, { "name": "59012", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59012" }, { "name": "58713", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58713" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" }, { "name": "59362", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59362" }, { "name": "MDVSA-2015:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" }, { "name": "HPSBMU03070", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2" }, { "name": "RHSA-2014:0631", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0631.html" }, { "name": "59338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59338" }, { "name": "59450", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59450" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1053.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "VU#978508", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/978508" }, { "name": "1031032", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031032" }, { "name": "59287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59287" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" }, { "name": "59491", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59491" }, { "name": "59364", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59364" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" }, { "name": "59451", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59451" }, { "name": "58977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58977" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.novell.com/support/kb/doc.php?id=7015271" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" }, { "name": "60571", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60571" }, { "name": "59459", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59459" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" }, { "name": "60577", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60577" }, { "name": "59448", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59448" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.blackberry.com/btsc/KB36051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" }, { "name": "HPSBST03103", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690" }, { "name": "59885", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59885" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" }, { "name": "59202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59202" }, { "name": "RHSA-2014:0633", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0633.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678" }, { "name": "59375", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59375" }, { "name": "HPSBMU03083", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2" }, { "name": "59528", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59528" }, { "name": "58337", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58337" }, { "name": "59518", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59518" }, { "name": "59389", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59389" }, { "name": "59162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59162" }, { "name": "59383", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59383" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217" }, { "name": "59490", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59490" }, { "name": "59916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59916" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E" }, { "name": "HPSBMU03065", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" }, { "name": "IT02314", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314" }, { "name": "59043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59043" }, { "name": "59347", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59347" }, { "name": "60049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60049" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-05T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-05T16:47:29", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "59342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59342" }, { "name": "59669", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59669" }, { "name": "59525", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59525" }, { "name": "HPSBMU03071", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2" }, { "name": "59004", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59004" }, { "name": "59530", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59530" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" }, { "name": "59824", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59824" }, { "name": "59282", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59282" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015300" }, { "name": "59215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59215" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "name": "59990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59990" }, { "name": "59264", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59264" }, { "name": "59454", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59454" }, { "name": "58492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58492" }, { "name": "59186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59186" }, { "name": "59188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59188" }, { "name": "59126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59126" }, { "name": "HPSBMU03078", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2" }, { "name": "HPSBMU03089", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015264" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" }, { "name": "59306", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59306" }, { "name": "RHSA-2014:0627", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0627.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "name": "HPSBGN03068", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2" }, { "name": "RHSA-2014:0626", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0626.html" }, { "name": "59190", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59190" }, { "name": "58639", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58639" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877" }, { "name": "59446", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59446" }, { "name": "59529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59529" }, { "name": "59445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59445" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "59589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59589" }, { "name": "59894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59894" }, { "name": "59325", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59325" }, { "name": "59354", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59354" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" }, { "name": "HPSBUX03046", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "61254", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61254" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" }, { "name": "59447", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59447" }, { "name": "1031594", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031594" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E" }, { "name": "59223", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59223" }, { "name": "58743", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58743" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "58719", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58719" }, { "name": "59449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59449" }, { "name": "59132", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59132" }, { "name": "SSRT101818", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" }, { "name": "HPSBST03098", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2" }, { "name": "HPSBMU03058", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2" }, { "name": "59442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59442" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946" }, { "name": "HPSBOV03047", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2" }, { "name": "HPSBST03195", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" }, { "name": "59441", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59441" }, { "name": "HPSBMU03074", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf" }, { "name": "HPSBMU03094", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://filezilla-project.org/versions.php?type=server" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" }, { "name": "60567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60567" }, { "name": "59189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59189" }, { "name": "59368", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59368" }, { "name": "MDVSA-2014:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106" }, { "name": "59142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59142" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" }, { "name": "58742", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58742" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670" }, { "name": "RHSA-2014:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0624.html" }, { "name": "59602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59602" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kerio.com/support/kerio-control/release-history" }, { "name": "59300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59300" }, { "name": "58930", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58930" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" }, { "name": "61815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61815" }, { "name": "58667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58667" }, { "name": "GLSA-201407-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" }, { "name": "59191", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59191" }, { "name": "59284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59284" }, { "name": "59444", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59444" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783" }, { "name": "59365", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59365" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" }, { "name": "59305", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59305" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" }, { "name": "59483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59483" }, { "name": "58385", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58385" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "59495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59495" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" }, { "name": "FEDORA-2014-9308", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html" }, { "name": "58945", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58945" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" }, { "name": "HPSBST03106", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2" }, { "name": "59659", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59659" }, { "name": "59440", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59440" }, { "name": "openSUSE-SU-2016:0640", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "59429", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59429" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "59655", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59655" }, { "name": "59370", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59370" }, { "name": "59827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59827" }, { "name": "58660", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58660" }, { "name": "59163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59163" }, { "name": "58716", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58716" }, { "name": "59055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59055" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" }, { "name": "59437", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59437" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754" }, { "name": "60176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60176" }, { "name": "HPSBPI03107", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2" }, { "name": "59101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx" }, { "name": "59374", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59374" }, { "name": "59063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59063" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://discussions.nessus.org/thread/7517" }, { "name": "59310", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59310" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" }, { "name": "HPSBMU03216", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" }, { "name": "IV61506", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506" }, { "name": "59502", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59502" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.splunk.com/view/SP-CAAAM2D" }, { "name": "59878", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59878" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fortiguard.com/advisory/FG-IR-14-018/" }, { "name": "SUSE-SU-2015:0743", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" }, { "name": "HPSBMU03101", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793" }, { "name": "59214", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59214" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356" }, { "name": "HPSBHF03088", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2" }, { "name": "HPSBMU03057", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.citrix.com/article/CTX140876" }, { "name": "59167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59167" }, { "name": "59120", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59120" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172" }, { "name": "HPSBMU03053", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2" }, { "name": "59380", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59380" }, { "name": "MDVSA-2014:105", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105" }, { "name": "59460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59460" }, { "name": "59506", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59506" }, { "name": "58939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58939" }, { "name": "SSRT101590", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "59661", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59661" }, { "name": "59514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59514" }, { "name": "59677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59677" }, { "name": "RHSA-2014:0630", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0630.html" }, { "name": "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195" }, { "name": "RHSA-2014:0632", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0632.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" }, { "name": "58745", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58745" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" }, { "name": "59438", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59438" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" }, { "name": "58714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58714" }, { "name": "HPSBGN03050", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2" }, { "name": "openSUSE-SU-2015:0229", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ccsinjection.lepidum.co.jp" }, { "name": "59435", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59435" }, { "name": "HPSBHF03052", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openssl.org/news/secadv_20140605.txt" }, { "name": "58615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58615" }, { "name": "HPSBST03265", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" }, { "name": "59231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59231" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671" }, { "name": "SUSE-SU-2015:0578", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6443" }, { "name": "59211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59211" }, { "name": "58433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58433" }, { "name": "60066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60066" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/site/blogs/766093/posts/908133" }, { "name": "59301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59301" }, { "name": "60522", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60522" }, { "name": "59784", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59784" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA80" }, { "name": "HPSBST03097", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2" }, { "name": "20140607 Re: More OpenSSL issues", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Jun/38" }, { "name": "HPSBMU03076", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" }, { "name": "59135", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59135" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" }, { "name": "58759", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58759" }, { "name": "59093", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59093" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://puppetlabs.com/security/cve/cve-2014-0224" }, { "name": "59192", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59192" }, { "name": "FEDORA-2014-9301", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html" }, { "name": "HPSBMU03062", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2" }, { "name": "58579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58579" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf" }, { "name": "59040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59040" }, { "name": "HPSBMU03056", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2" }, { "name": "59175", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59175" }, { "name": "60819", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60819" }, { "name": "HPSBMU03051", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2" }, { "name": "59666", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59666" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" }, { "name": "58128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58128" }, { "name": "HPSBMU03055", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2" }, { "name": "59413", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59413" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" }, { "name": "59721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59721" }, { "name": "HPSBHF03145", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756" }, { "name": "RHSA-2014:0680", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0680.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" }, { "name": "59012", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59012" }, { "name": "58713", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58713" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" }, { "name": "59362", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59362" }, { "name": "MDVSA-2015:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" }, { "name": "HPSBMU03070", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2" }, { "name": "RHSA-2014:0631", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0631.html" }, { "name": "59338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59338" }, { "name": "59450", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59450" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1053.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "VU#978508", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/978508" }, { "name": "1031032", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031032" }, { "name": "59287", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59287" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" }, { "name": "59491", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59491" }, { "name": "59364", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59364" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" }, { "name": "59451", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59451" }, { "name": "58977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58977" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.novell.com/support/kb/doc.php?id=7015271" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" }, { "name": "60571", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60571" }, { "name": "59459", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59459" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" }, { "name": "60577", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60577" }, { "name": "59448", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59448" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.blackberry.com/btsc/KB36051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" }, { "name": "HPSBST03103", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690" }, { "name": "59885", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59885" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" }, { "name": "59202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59202" }, { "name": "RHSA-2014:0633", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0633.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678" }, { "name": "59375", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59375" }, { "name": "HPSBMU03083", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2" }, { "name": "59528", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59528" }, { "name": "58337", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58337" }, { "name": "59518", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59518" }, { "name": "59389", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59389" }, { "name": "59162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59162" }, { "name": "59383", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59383" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217" }, { "name": "59490", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59490" }, { "name": "59916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59916" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E" }, { "name": "HPSBMU03065", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" }, { "name": "IT02314", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314" }, { "name": "59043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59043" }, { "name": "59347", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59347" }, { "name": "60049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60049" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "59342", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59342" }, { "name": "59669", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59669" }, { "name": "59525", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59525" }, { "name": "HPSBMU03071", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2" }, { "name": "59004", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59004" }, { "name": "59530", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59530" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" }, { "name": "59824", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59824" }, { "name": "59282", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59282" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015300", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015300" }, { "name": "59215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59215" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "name": "59990", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59990" }, { "name": "59264", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59264" }, { "name": "59454", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59454" }, { "name": "58492", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58492" }, { "name": "59186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59186" }, { "name": "59188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59188" }, { "name": "59126", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59126" }, { "name": "HPSBMU03078", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2" }, { "name": "HPSBMU03089", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015264", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015264" }, { "name": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", "refsource": "CONFIRM", "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" }, { "name": "59306", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59306" }, { "name": "RHSA-2014:0627", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0627.html" }, { "name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", "refsource": "CONFIRM", "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "name": "HPSBGN03068", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2" }, { "name": "RHSA-2014:0626", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0626.html" }, { "name": "59190", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59190" }, { "name": "58639", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58639" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676877", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877" }, { "name": "59446", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59446" }, { "name": "59529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59529" }, { "name": "59445", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59445" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "59589", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59589" }, { "name": "59894", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59894" }, { "name": "59325", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59325" }, { "name": "59354", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59354" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" }, { "name": "HPSBUX03046", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "61254", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61254" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" }, { "name": "59447", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59447" }, { "name": "1031594", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031594" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E", "refsource": "CONFIRM", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E" }, { "name": "59223", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59223" }, { "name": "58743", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58743" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "58719", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58719" }, { "name": "59449", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59449" }, { "name": "59132", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59132" }, { "name": "SSRT101818", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" }, { "name": "HPSBST03098", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2" }, { "name": "HPSBMU03058", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2" }, { "name": "59442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59442" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946" }, { "name": "HPSBOV03047", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2" }, { "name": "HPSBST03195", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" }, { "name": "59441", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59441" }, { "name": "HPSBMU03074", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2" }, { "name": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", "refsource": "CONFIRM", "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf" }, { "name": "HPSBMU03094", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2" }, { "name": "https://filezilla-project.org/versions.php?type=server", "refsource": "CONFIRM", "url": "https://filezilla-project.org/versions.php?type=server" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" }, { "name": "60567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60567" }, { "name": "59189", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59189" }, { "name": "59368", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59368" }, { "name": "MDVSA-2014:106", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106" }, { "name": "59142", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59142" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" }, { "name": "58742", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58742" }, { "name": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", "refsource": "CONFIRM", "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670" }, { "name": "RHSA-2014:0624", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0624.html" }, { "name": "59602", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59602" }, { "name": "http://www.kerio.com/support/kerio-control/release-history", "refsource": "CONFIRM", "url": "http://www.kerio.com/support/kerio-control/release-history" }, { "name": "59300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59300" }, { "name": "58930", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58930" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" }, { "name": "61815", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61815" }, { "name": "58667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58667" }, { "name": "GLSA-201407-05", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" }, { "name": "59191", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59191" }, { "name": "59284", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59284" }, { "name": "59444", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59444" }, { "name": "https://www.imperialviolet.org/2014/06/05/earlyccs.html", "refsource": "MISC", "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24037783", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783" }, { "name": "59365", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59365" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" }, { "name": "59305", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59305" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" }, { "name": "59483", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59483" }, { "name": "58385", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58385" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "59495", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59495" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" }, { "name": "FEDORA-2014-9308", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html" }, { "name": "58945", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58945" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" }, { "name": "HPSBST03106", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2" }, { "name": "59659", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59659" }, { "name": "59440", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59440" }, { "name": "openSUSE-SU-2016:0640", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "59429", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59429" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "59655", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59655" }, { "name": "59370", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59370" }, { "name": "59827", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59827" }, { "name": "58660", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58660" }, { "name": "59163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59163" }, { "name": "58716", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58716" }, { "name": "59055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59055" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" }, { "name": "59437", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59437" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754" }, { "name": "60176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60176" }, { "name": "HPSBPI03107", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2" }, { "name": "59101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59101" }, { "name": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", "refsource": "CONFIRM", "url": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx" }, { "name": "59374", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59374" }, { "name": "59063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59063" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html" }, { "name": "https://discussions.nessus.org/thread/7517", "refsource": "CONFIRM", "url": "https://discussions.nessus.org/thread/7517" }, { "name": "59310", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59310" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" }, { "name": "HPSBMU03216", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", "refsource": "CONFIRM", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" }, { "name": "IV61506", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506" }, { "name": "59502", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59502" }, { "name": "http://www.splunk.com/view/SP-CAAAM2D", "refsource": "CONFIRM", "url": "http://www.splunk.com/view/SP-CAAAM2D" }, { "name": "59878", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59878" }, { "name": "http://www.fortiguard.com/advisory/FG-IR-14-018/", "refsource": "CONFIRM", "url": "http://www.fortiguard.com/advisory/FG-IR-14-018/" }, { "name": "SUSE-SU-2015:0743", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" }, { "name": "HPSBMU03101", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676793", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793" }, { "name": "59214", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59214" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676356", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356" }, { "name": "HPSBHF03088", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2" }, { "name": "HPSBMU03057", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2" }, { "name": "http://support.citrix.com/article/CTX140876", "refsource": "CONFIRM", "url": "http://support.citrix.com/article/CTX140876" }, { "name": "59167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59167" }, { "name": "59120", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59120" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172" }, { "name": "HPSBMU03053", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2" }, { "name": "59380", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59380" }, { "name": "MDVSA-2014:105", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105" }, { "name": "59460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59460" }, { "name": "59506", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59506" }, { "name": "58939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58939" }, { "name": "SSRT101590", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "59661", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59661" }, { "name": "59514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59514" }, { "name": "59677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59677" }, { "name": "RHSA-2014:0630", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0630.html" }, { "name": "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195" }, { "name": "RHSA-2014:0632", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0632.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" }, { "name": "58745", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58745" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" }, { "name": "59438", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59438" }, { "name": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" }, { "name": "58714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58714" }, { "name": "HPSBGN03050", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2" }, { "name": "openSUSE-SU-2015:0229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" }, { "name": "http://ccsinjection.lepidum.co.jp", "refsource": "MISC", "url": "http://ccsinjection.lepidum.co.jp" }, { "name": "59435", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59435" }, { "name": "HPSBHF03052", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2" }, { "name": "http://www.openssl.org/news/secadv_20140605.txt", "refsource": "CONFIRM", "url": "http://www.openssl.org/news/secadv_20140605.txt" }, { "name": "58615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58615" }, { "name": "HPSBST03265", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" }, { "name": "59231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59231" }, { "name": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", "refsource": "CONFIRM", "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671" }, { "name": "SUSE-SU-2015:0578", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" }, { "name": "http://support.apple.com/kb/HT6443", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6443" }, { "name": "59211", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59211" }, { "name": "58433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58433" }, { "name": "60066", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60066" }, { "name": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" }, { "name": "https://access.redhat.com/site/blogs/766093/posts/908133", "refsource": "CONFIRM", "url": "https://access.redhat.com/site/blogs/766093/posts/908133" }, { "name": "59301", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59301" }, { "name": "60522", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60522" }, { "name": "59784", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59784" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA80", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA80" }, { "name": "HPSBST03097", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2" }, { "name": "20140607 Re: More OpenSSL issues", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Jun/38" }, { "name": "HPSBMU03076", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2" }, { "name": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", "refsource": "CONFIRM", "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" }, { "name": "59135", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59135" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" }, { "name": "58759", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58759" }, { "name": "59093", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59093" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740" }, { "name": "http://puppetlabs.com/security/cve/cve-2014-0224", "refsource": "CONFIRM", "url": "http://puppetlabs.com/security/cve/cve-2014-0224" }, { "name": "59192", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59192" }, { "name": "FEDORA-2014-9301", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html" }, { "name": "HPSBMU03062", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2" }, { "name": "58579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58579" }, { "name": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", "refsource": "CONFIRM", "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf" }, { "name": "59040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59040" }, { "name": "HPSBMU03056", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2" }, { "name": "59175", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59175" }, { "name": "60819", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60819" }, { "name": "HPSBMU03051", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2" }, { "name": "59666", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59666" }, { "name": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", "refsource": "CONFIRM", "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" }, { "name": "58128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58128" }, { "name": "HPSBMU03055", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2" }, { "name": "59413", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59413" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" }, { "name": "59721", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59721" }, { "name": "HPSBHF03145", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756" }, { "name": "RHSA-2014:0680", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0680.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" }, { "name": "59012", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59012" }, { "name": "58713", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58713" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" }, { "name": "59362", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59362" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" }, { "name": "HPSBMU03070", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2" }, { "name": "RHSA-2014:0631", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0631.html" }, { "name": "59338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59338" }, { "name": "59450", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59450" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1053.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1053.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "VU#978508", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/978508" }, { "name": "1031032", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031032" }, { "name": "59287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59287" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" }, { "name": "59491", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59491" }, { "name": "59364", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59364" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" }, { "name": "59451", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59451" }, { "name": "58977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58977" }, { "name": "https://www.novell.com/support/kb/doc.php?id=7015271", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=7015271" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" }, { "name": "60571", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60571" }, { "name": "59459", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59459" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" }, { "name": "60577", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60577" }, { "name": "59448", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59448" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441" }, { "name": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", "refsource": "CONFIRM", "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf" }, { "name": "http://www.blackberry.com/btsc/KB36051", "refsource": "CONFIRM", "url": "http://www.blackberry.com/btsc/KB36051" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755" }, { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" }, { "name": "HPSBST03103", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690" }, { "name": "59885", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59885" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" }, { "name": "59202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59202" }, { "name": "RHSA-2014:0633", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0633.html" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678" }, { "name": "59375", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59375" }, { "name": "HPSBMU03083", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2" }, { "name": "59528", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59528" }, { "name": "58337", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58337" }, { "name": "59518", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59518" }, { "name": "59389", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59389" }, { "name": "59162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59162" }, { "name": "59383", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59383" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217" }, { "name": "59490", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59490" }, { "name": "59916", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59916" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E", "refsource": "CONFIRM", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E" }, { "name": "HPSBMU03065", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" }, { "name": "IT02314", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314" }, { "name": "59043", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59043" }, { "name": "59347", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59347" }, { "name": "60049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60049" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0224", "datePublished": "2014-06-05T21:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:39.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-0224\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-06-05T21:55:07.817\",\"lastModified\":\"2024-11-21T02:01:41.000\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \\\"CCS Injection\\\" vulnerability.\"},{\"lang\":\"es\",\"value\":\"OpenSSL anterior a 0.9.8za, 1.0.0 anterior a 1.0.0m y 1.0.1 anterior a 1.0.1h no restringe debidamente el procesamiento de mensajes ChangeCipherSpec, lo que permite a atacantes man-in-the-middle provocar el uso de una clave maestra de longitud cero en ciertas comunicaciones OpenSSL-a-OpenSSL, y como consecuencia secuestrar sesiones u obtener informaci\u00f3n sensible, a trav\u00e9s de una negociaci\u00f3n TLS manipulada, tambi\u00e9n conocido como la vulnerabilidad de \u0027inyecci\u00f3n CCS\u0027.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.9.8za\",\"matchCriteriaId\":\"8FA55B3F-13D6-4DB6-A215-544A4CB44144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndExcluding\":\"1.0.0m\",\"matchCriteriaId\":\"126D6450-A9AC-4646-879E-3F53482AADD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.1\",\"versionEndExcluding\":\"1.0.1h\",\"matchCriteriaId\":\"0B107973-BC4B-450F-A083-7C89DE05328B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46849C8D-36E9-4E97-BB49-E04F4EB199E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC1CA30-C6BE-411C-9EA1-D12B48B3556D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F66D5B-F906-437E-977E-F9F930648886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25FD2879-A940-4EC7-9636-71E2A1ECFB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53C986BD-2D1F-4865-B16D-72FD875E3776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5991814D-CA77-4C25-90D2-DB542B17E0AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA2C244C-82F6-49BC-B7F7-54AB989C43E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.9.45\",\"matchCriteriaId\":\"6DE46452-FB3D-4472-B5E8-867A925410F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:application_processing_engine_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.0.2\",\"matchCriteriaId\":\"056484D7-6824-4D2C-9CB9-119E9F98AD9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE6A8466-8A69-491B-8DAB-877A6C2F6660\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:cp1543-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.25\",\"matchCriteriaId\":\"2F9DB366-2F2A-4A24-95AA-1389E87563FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:cp1543-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970C7CDA-4BFF-44EC-B26B-1BA5415DA01D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:s7-1500_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6\",\"matchCriteriaId\":\"C7E99CFB-7509-4C84-862D-B95B9151AE19\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:s7-1500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDF192C-15CD-4A0A-933C-50F61A578CB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:rox_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.16.1\",\"matchCriteriaId\":\"E844A484-1DD6-4225-8634-8E722A42F7FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:rox:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFE77730-43FD-40A6-89C0-83EF6CC25F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.0.13\",\"matchCriteriaId\":\"504AA794-4421-422D-A1C7-BB5AE334FD55\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndExcluding\":\"2.7.8\",\"matchCriteriaId\":\"3E972B9F-0AAD-4076-8B19-55161B67E6FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.4.0\",\"versionEndExcluding\":\"3.4.2\",\"matchCriteriaId\":\"77B49A11-B6B3-417A-8142-FA0967D4E684\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.10.29\",\"matchCriteriaId\":\"650C774B-058F-4898-8E3F-3D65BD28BD2E\"}]}]}],\"references\":[{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://ccsinjection.lepidum.co.jp\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://esupport.trendmicro.com/solution/en-US/1103813.aspx\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1053.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://puppetlabs.com/security/cve/cve-2014-0224\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0624.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0626.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0627.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0630.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0631.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0632.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0633.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0680.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Dec/23\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Jun/38\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58128\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58337\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58385\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58433\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58492\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58579\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58615\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58639\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58660\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58667\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58713\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58714\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58716\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58719\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58742\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58743\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58745\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58759\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58930\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58939\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58945\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58977\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59004\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59012\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59040\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59043\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59055\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59063\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59093\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59101\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59120\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59126\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59132\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59135\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59142\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59162\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59163\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59167\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59175\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59186\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59188\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59189\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59190\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59191\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59192\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59202\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59211\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59214\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59215\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59223\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59231\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59264\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59282\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59284\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59287\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59300\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59301\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59305\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59306\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59310\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59325\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59338\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59342\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59347\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59354\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59362\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59364\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59365\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59368\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59370\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59374\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59375\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59380\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59383\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59389\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59413\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59429\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59435\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59437\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59438\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59440\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59441\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59442\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59444\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59445\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59446\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59447\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59448\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59449\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59450\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59451\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59454\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59459\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59460\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59483\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59490\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59491\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59495\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59502\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59506\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59514\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59518\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59525\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59528\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59529\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59530\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59589\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59602\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59655\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59659\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59661\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59666\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59669\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59677\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59721\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59784\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59824\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59827\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59878\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59885\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59894\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59916\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59990\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60049\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60066\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60176\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60522\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60567\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60571\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60577\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60819\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61254\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61815\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201407-05.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT6443\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX140876\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg400001841\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg400001843\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21673137\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21675626\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21675821\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676035\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676062\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676071\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676333\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676334\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676419\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676478\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676496\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676501\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676529\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676536\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676615\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676644\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676655\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676786\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676833\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676845\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676879\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676889\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677080\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677131\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677390\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677527\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677567\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677695\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677828\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677836\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678167\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678233\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678289\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21683332\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037727\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037729\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037730\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037731\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037732\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037761\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037870\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.blackberry.com/btsc/KB36051\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.f-secure.com/en/web/labs_global/fsc-2014-6\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.fortiguard.com/advisory/FG-IR-14-018/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg3T1020948\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=ssg1S1004678\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IT02314\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21676356\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21676793\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21676877\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24037783\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/978508\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kerio.com/support/kerio-control/release-history\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:105\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:106\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015264\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015300\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openssl.org/news/secadv_20140605.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/534161/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1031032\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1031594\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.splunk.com/view/SP-CAAAM2D\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0012.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/site/blogs/766093/posts/908133\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1103586\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://discussions.nessus.org/thread/7517\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://filezilla-project.org/versions.php?type=server\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA80\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.ibm.com/support/docview.wss?uid=ssg1S1004670\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.ibm.com/support/docview.wss?uid=ssg1S1004671\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.imperialviolet.org/2014/06/05/earlyccs.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.novell.com/support/kb/doc.php?id=7015271\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://ccsinjection.lepidum.co.jp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://esupport.trendmicro.com/solution/en-US/1103813.aspx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1053.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://puppetlabs.com/security/cve/cve-2014-0224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0624.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0627.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0630.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0631.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0632.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0633.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0680.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Dec/23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Jun/38\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58337\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58385\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58433\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58615\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58639\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58660\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58713\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58719\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58743\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58759\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58945\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58977\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59093\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59132\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59175\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59191\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59192\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59202\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59211\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59214\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59215\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59264\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59282\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59301\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59305\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59306\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59310\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59325\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59338\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59347\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59354\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59362\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59364\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59368\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59370\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59374\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59375\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59383\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59389\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59429\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59435\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59437\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59441\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59444\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59445\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59446\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59449\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59450\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59451\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59459\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59490\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59491\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59502\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59514\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59518\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59525\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59528\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59589\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59602\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59655\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59661\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59666\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59784\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59878\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59885\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59894\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59916\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60571\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60577\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60819\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61815\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201407-05.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT6443\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX140876\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg400001841\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg400001843\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21673137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21675626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21675821\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676062\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676419\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676496\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676501\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676536\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676615\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676644\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676655\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676786\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21676889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677695\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677828\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21677836\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678233\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21683332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037727\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037731\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037732\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg24037870\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.blackberry.com/btsc/KB36051\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.f-secure.com/en/web/labs_global/fsc-2014-6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.fortiguard.com/advisory/FG-IR-14-018/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg3T1020948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=ssg1S1004678\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg1IT02314\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21676356\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21676793\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg21676877\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24037783\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/978508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kerio.com/support/kerio-control/release-history\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:105\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015264\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openssl.org/news/secadv_20140605.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/534161/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1031032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1031594\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.splunk.com/view/SP-CAAAM2D\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/site/blogs/766093/posts/908133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1103586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://discussions.nessus.org/thread/7517\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://filezilla-project.org/versions.php?type=server\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA80\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.ibm.com/support/docview.wss?uid=ssg1S1004670\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.ibm.com/support/docview.wss?uid=ssg1S1004671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.imperialviolet.org/2014/06/05/earlyccs.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.novell.com/support/kb/doc.php?id=7015271\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2014_0626
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl097a and openssl098e packages that fix one security issue\nare now available for Red Hat Enterprise Linux 5 and 6 respectively.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0626", "url": "https://access.redhat.com/errata/RHSA-2014:0626" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0626.json" } ], "title": "Red Hat Security Advisory: openssl097a and openssl098e security update", "tracking": { "current_release_date": "2024-11-22T08:02:17+00:00", "generator": { "date": "2024-11-22T08:02:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0626", "initial_release_date": "2014-06-05T12:01:47+00:00", "revision_history": [ { "date": "2014-06-05T12:01:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-05T12:01:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl097a-0:0.9.7a-12.el5_10.1.ia64", "product": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ia64", "product_id": "openssl097a-0:0.9.7a-12.el5_10.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a@0.9.7a-12.el5_10.1?arch=ia64" } } }, { "category": "product_version", "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "product": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "product_id": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a-debuginfo@0.9.7a-12.el5_10.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl097a-0:0.9.7a-12.el5_10.1.i386", "product": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.i386", "product_id": "openssl097a-0:0.9.7a-12.el5_10.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a@0.9.7a-12.el5_10.1?arch=i386" } } }, { "category": "product_version", "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "product": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "product_id": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a-debuginfo@0.9.7a-12.el5_10.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl097a-0:0.9.7a-12.el5_10.1.s390", "product": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.s390", "product_id": "openssl097a-0:0.9.7a-12.el5_10.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a@0.9.7a-12.el5_10.1?arch=s390" } } }, { "category": "product_version", "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "product": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "product_id": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a-debuginfo@0.9.7a-12.el5_10.1?arch=s390" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "product_id": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-18.el6_5.2?arch=s390" } } }, { "category": "product_version", "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390", "product": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390", "product_id": "openssl098e-0:0.9.8e-18.el6_5.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-18.el6_5.2?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl097a-0:0.9.7a-12.el5_10.1.s390x", "product": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.s390x", "product_id": "openssl097a-0:0.9.7a-12.el5_10.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a@0.9.7a-12.el5_10.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "product": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "product_id": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a-debuginfo@0.9.7a-12.el5_10.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "product_id": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-18.el6_5.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390x", "product": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390x", "product_id": "openssl098e-0:0.9.8e-18.el6_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-18.el6_5.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "product": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "product_id": "openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a@0.9.7a-12.el5_10.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "product": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "product_id": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a-debuginfo@0.9.7a-12.el5_10.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "product_id": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-18.el6_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "product": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "product_id": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-18.el6_5.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl097a-0:0.9.7a-12.el5_10.1.ppc", "product": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ppc", "product_id": "openssl097a-0:0.9.7a-12.el5_10.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a@0.9.7a-12.el5_10.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "product": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "product_id": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a-debuginfo@0.9.7a-12.el5_10.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "product_id": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-18.el6_5.2?arch=ppc" } } }, { "category": "product_version", "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc", "product": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc", "product_id": "openssl098e-0:0.9.8e-18.el6_5.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-18.el6_5.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "product": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "product_id": "openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a@0.9.7a-12.el5_10.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "product": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "product_id": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a-debuginfo@0.9.7a-12.el5_10.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "product_id": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-18.el6_5.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "product": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "product_id": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-18.el6_5.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl097a-0:0.9.7a-12.el5_10.1.src", "product": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.src", "product_id": "openssl097a-0:0.9.7a-12.el5_10.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl097a@0.9.7a-12.el5_10.1?arch=src" } } }, { "category": "product_version", "name": "openssl098e-0:0.9.8e-18.el6_5.2.src", "product": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.src", "product_id": "openssl098e-0:0.9.8e-18.el6_5.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-18.el6_5.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "product_id": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-18.el6_5.2?arch=i686" } } }, { "category": "product_version", "name": "openssl098e-0:0.9.8e-18.el6_5.2.i686", "product": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.i686", "product_id": "openssl098e-0:0.9.8e-18.el6_5.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-18.el6_5.2?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.i386" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ia64" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc64" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390x" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.src" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.x86_64" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.i386" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ia64" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc64" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390x" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.src" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-0:0.9.7a-12.el5_10.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.x86_64" }, "product_reference": "openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64" }, "product_reference": "openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.src", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64" }, "product_reference": "openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.i386", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ia64", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390x", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.src", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.i386", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ia64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390x", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.src", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T12:01:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.i386", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ia64", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390x", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.src", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.i386", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ia64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390x", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.src", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0626" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.i386", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ia64", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390x", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.src", "5Client-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "5Client-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.i386", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ia64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.ppc64", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.s390x", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.src", "5Server-5.10.Z:openssl097a-0:0.9.7a-12.el5_10.1.x86_64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.i386", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ia64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.ppc64", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.s390x", "5Server-5.10.Z:openssl097a-debuginfo-0:0.9.7a-12.el5_10.1.x86_64", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Client-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Client-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6ComputeNode-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6ComputeNode-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Server-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Server-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.i686", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.ppc64", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.s390x", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.src", "6Workstation-6.5.z:openssl098e-0:0.9.8e-18.el6_5.2.x86_64", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.i686", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.ppc64", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.s390x", "6Workstation-6.5.z:openssl098e-debuginfo-0:0.9.8e-18.el6_5.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
rhsa-2014_0629
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes two security issues is\nnow available.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nA flaw was found in the way the handle_rx() function handled large network\npackets when mergeable buffers were disabled. A privileged guest user could\nuse this flaw to crash the host or corrupt QEMU process memory on the host,\nwhich could potentially result in arbitrary code execution on the host with\nthe privileges of the QEMU process. (CVE-2014-0077)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2014-0224. Upstream acknowledges KIKUCHI Masashi of Lepidum as the\noriginal reporter of CVE-2014-0224. The CVE-2014-0077 issue was discovered\nby Michael S. Tsirkin of Red Hat.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2014-0015 and CVE-2014-0138 (curl issues)\n\nCVE-2014-2523 and CVE-2013-6383 (kernel issues)\n\nCVE-2014-0179 (libvirt issue)\n\nCVE-2010-5298, CVE-2014-0198, CVE-2014-0221, CVE-2014-0195, and\nCVE-2014-3470 (openssl issues)\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0629", "url": "https://access.redhat.com/errata/RHSA-2014:0629" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/906913", "url": "https://access.redhat.com/site/solutions/906913" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.3/html/Administration_Guide/chap-Updating_the_Red_Hat_Enterprise_Virtualization_Environment.html#Updating_Red_Hat_Enterprise_Virtualization_Hypervisors1", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.3/html/Administration_Guide/chap-Updating_the_Red_Hat_Enterprise_Virtualization_Environment.html#Updating_Red_Hat_Enterprise_Virtualization_Hypervisors1" }, { "category": "external", "summary": "1064440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064440" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0629.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security update", "tracking": { "current_release_date": "2024-11-22T08:02:40+00:00", "generator": { "date": "2024-11-22T08:02:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0629", "initial_release_date": "2014-06-05T14:57:02+00:00", "revision_history": [ { "date": "2014-06-05T14:57:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-05T14:57:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch", "product": { "name": "rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch", "product_id": "rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140603.1.el6ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch" }, "product_reference": "rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Michael S. Tsirkin" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2014-0077", "discovery_date": "2014-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1064440" } ], "notes": [ { "category": "description", "text": "drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vhost-net: insufficiency in handling of big packets in handle_rx()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0077" }, { "category": "external", "summary": "RHBZ#1064440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1064440" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0077", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0077" } ], "release_date": "2014-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T14:57:02+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.3/html/Administration_Guide/chap-Updating_the_Red_Hat_Enterprise_Virtualization_Environment.html#Updating_Red_Hat_Enterprise_Virtualization_Hypervisors1", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0629" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:H/Au:S/C:P/I:P/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: vhost-net: insufficiency in handling of big packets in handle_rx()" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T14:57:02+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.3/html/Administration_Guide/chap-Updating_the_Red_Hat_Enterprise_Virtualization_Environment.html#Updating_Red_Hat_Enterprise_Virtualization_Hypervisors1", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0629" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140603.1.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
rhsa-2014_0628
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix multiple security issues are now\navailable for Red Hat Storage 2.1.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nA buffer overflow flaw was found in the way OpenSSL handled invalid DTLS\npacket fragments. A remote attacker could possibly use this flaw to execute\narbitrary code on a DTLS client or server. (CVE-2014-0195)\n\nMultiple flaws were found in the way OpenSSL handled read and write buffers\nwhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or\nserver using OpenSSL could crash or unexpectedly drop connections when\nprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)\n\nA denial of service flaw was found in the way OpenSSL handled certain DTLS\nServerHello requests. A specially crafted DTLS handshake packet could cause\na DTLS client using OpenSSL to crash. (CVE-2014-0221)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed\nanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially\ncrafted handshake packet could cause a TLS/SSL client that has the\nanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)\n\nRed Hat would like to thank the OpenSSL project for reporting these issues.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof CVE-2014-0224, J\u00fcri Aedla as the original reporter of CVE-2014-0195,\nImre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix\nGr\u00f6bert and Ivan Fratri\u0107 of Google as the original reporters of\nCVE-2014-3470.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0628", "url": "https://access.redhat.com/errata/RHSA-2014:0628" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/906703", "url": "https://access.redhat.com/site/solutions/906703" }, { "category": "external", "summary": "1087195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087195" }, { "category": "external", "summary": "1093837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093837" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "1103593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103593" }, { "category": "external", "summary": "1103598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103598" }, { "category": "external", "summary": "1103600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103600" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0628.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:21:18+00:00", "generator": { "date": "2024-11-22T08:21:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0628", "initial_release_date": "2014-06-05T12:12:30+00:00", "revision_history": [ { "date": "2014-06-05T12:12:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-05T12:12:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:21:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Storage Server 2.1", "product": { "name": "Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:2.1:server:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-16.el6_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-16.el6_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-16.el6_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-16.el6_5.14?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.src", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.src", "product_id": "openssl-0:1.0.1e-16.el6_5.14.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-5298", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-04-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1087195" } ], "notes": [ { "category": "description", "text": "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: freelist misuse causing a possible use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the openssl packages shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-5298" }, { "category": "external", "summary": "RHBZ#1087195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087195" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-5298", "url": "https://www.cve.org/CVERecord?id=CVE-2010-5298" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-5298", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5298" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T12:12:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0628" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: freelist misuse causing a possible use-after-free" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "J\u00fcri Aedla" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0195", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103598" } ], "notes": [ { "category": "description", "text": "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Buffer overflow via DTLS invalid fragment", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl as shipped with Red Hat Enterprise Linux 5. This issue does not affect the version of openssl098e as shipped with Red Hat Enterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0195" }, { "category": "external", "summary": "RHBZ#1103598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103598" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0195", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0195" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T12:12:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0628" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Buffer overflow via DTLS invalid fragment" }, { "cve": "CVE-2014-0198", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1093837" } ], "notes": [ { "category": "description", "text": "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the openssl packages shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0198" }, { "category": "external", "summary": "RHBZ#1093837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0198", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0198" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T12:12:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0628" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Imre Rad" ], "organization": "Search-Lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0221", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103593" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DoS when sending invalid DTLS handshake", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0221" }, { "category": "external", "summary": "RHBZ#1103593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103593" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0221", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0221" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T12:12:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0628" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DoS when sending invalid DTLS handshake" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T12:12:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0628" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Felix Gr\u00f6bert" ], "summary": "Acknowledged by upstream." }, { "names": [ "Ivan Fratri\u0107" ], "organization": "Google", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3470", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103600" } ], "notes": [ { "category": "description", "text": "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: client-side denial of service when using anonymous ECDH", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl and openssl097a as shipped with Red Hat Enterprise Linux 5. This issue does not affect the openssl098e as shipped with Red Hat Enterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3470" }, { "category": "external", "summary": "RHBZ#1103600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3470", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3470" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T12:12:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0628" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: client-side denial of service when using anonymous ECDH" } ] }
rhsa-2014_0624
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0624", "url": "https://access.redhat.com/errata/RHSA-2014:0624" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0624.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:02:28+00:00", "generator": { "date": "2024-11-22T08:02:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0624", "initial_release_date": "2014-06-05T11:51:23+00:00", "revision_history": [ { "date": "2014-06-05T11:51:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-05T11:51:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "product": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "product_id": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-27.el5_10.3?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "product_id": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-27.el5_10.3?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.x86_64", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.x86_64", "product_id": "openssl-0:0.9.8e-27.el5_10.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "product": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "product_id": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-27.el5_10.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-27.el5_10.3.i386", "product": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.i386", "product_id": "openssl-devel-0:0.9.8e-27.el5_10.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-27.el5_10.3?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "product": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "product_id": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-27.el5_10.3?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.i386", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.i386", "product_id": "openssl-0:0.9.8e-27.el5_10.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-27.el5_10.3.i386", "product": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.i386", "product_id": "openssl-perl-0:0.9.8e-27.el5_10.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-27.el5_10.3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.src", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.src", "product_id": "openssl-0:0.9.8e-27.el5_10.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "product": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "product_id": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-27.el5_10.3?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "product": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "product_id": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-27.el5_10.3?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.ia64", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.ia64", "product_id": "openssl-0:0.9.8e-27.el5_10.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "product": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "product_id": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-27.el5_10.3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "product": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "product_id": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-27.el5_10.3?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.i686", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.i686", "product_id": "openssl-0:0.9.8e-27.el5_10.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390", "product": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390", "product_id": "openssl-devel-0:0.9.8e-27.el5_10.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-27.el5_10.3?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "product": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "product_id": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-27.el5_10.3?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.s390", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.s390", "product_id": "openssl-0:0.9.8e-27.el5_10.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "product": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "product_id": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-27.el5_10.3?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "product": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "product_id": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-27.el5_10.3?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.s390x", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.s390x", "product_id": "openssl-0:0.9.8e-27.el5_10.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "product": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "product_id": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-27.el5_10.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "product": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "product_id": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-27.el5_10.3?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "product": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "product_id": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-27.el5_10.3?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.ppc", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.ppc", "product_id": "openssl-0:0.9.8e-27.el5_10.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "product": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "product_id": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-27.el5_10.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "product": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "product_id": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-27.el5_10.3?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "product_id": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-27.el5_10.3?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-27.el5_10.3.ppc64", "product": { "name": "openssl-0:0.9.8e-27.el5_10.3.ppc64", "product_id": "openssl-0:0.9.8e-27.el5_10.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-27.el5_10.3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.i686", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.i686", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.src", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.i686", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "relates_to_product_reference": "5Server-5.10.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T11:51:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0624" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Client-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Client-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Client-Workstation-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Client-Workstation-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.i686", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.src", "5Server-5.10.Z:openssl-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.i686", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-debuginfo-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.ppc64", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-devel-0:0.9.8e-27.el5_10.3.x86_64", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.i386", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ia64", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.ppc", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.s390x", "5Server-5.10.Z:openssl-perl-0:0.9.8e-27.el5_10.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
rhsa-2014_0631
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat JBoss Enterprise Application Platform 6.2.3 that\nfixes one security issue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. Red Hat JBoss Enterprise Application Platform includes OpenSSL\n0.9.8e, so this flaw is only exploitable when OpenSSL in JBoss EAP is used\nas a client, communicating with a vulnerable server running OpenSSL version\n1.0.1 and above. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.2.3 as\nprovided from the Red Hat Customer Portal are advised to apply this update.\nThe JBoss server process must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0631", "url": "https://access.redhat.com/errata/RHSA-2014:0631" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/906533", "url": "https://access.redhat.com/site/solutions/906533" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.2.0" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0631.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 security update", "tracking": { "current_release_date": "2024-11-22T08:02:53+00:00", "generator": { "date": "2024-11-22T08:02:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0631", "initial_release_date": "2014-06-05T15:27:34+00:00", "revision_history": [ { "date": "2014-06-05T15:27:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:33:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.2", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.2", "product_id": "Red Hat JBoss Enterprise Application Platform 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T15:27:34+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting Red Hat JBoss Enterprise Application Platform installation and\ndeployed applications (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0631" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
rhsa-2014_0632
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the openssl component for Red Hat JBoss Web Server 2.0.1 that\nfixes one security issue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. It is comprised of the Apache\nHTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector\n(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat\nNative library.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. Red Hat JBoss Web Server includes OpenSSL 0.9.8e, so this flaw is\nonly exploitable when OpenSSL in JBoss Web Server is used as a client,\ncommunicating with a vulnerable server running OpenSSL version 1.0.1 and\nabove. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll users of Red Hat JBoss Web Server 2.0.1 as provided from the Red Hat\nCustomer Portal are advised to apply this update. The Red Hat JBoss Web\nServer process must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0632", "url": "https://access.redhat.com/errata/RHSA-2014:0632" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/906533", "url": "https://access.redhat.com/site/solutions/906533" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.0.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.0.1" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0632.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 openssl security update", "tracking": { "current_release_date": "2024-11-22T08:02:22+00:00", "generator": { "date": "2024-11-22T08:02:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0632", "initial_release_date": "2014-06-05T14:56:52+00:00", "revision_history": [ { "date": "2014-06-05T14:56:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:33:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 2.0", "product": { "name": "Red Hat JBoss Web Server 2.0", "product_id": "Red Hat JBoss Web Server 2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T14:56:52+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files).", "product_ids": [ "Red Hat JBoss Web Server 2.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0632" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 2.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
rhsa-2014_0633
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat JBoss Enterprise Web Platform 5.2.0 that fixes one\nsecurity issue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Web Platform is a platform for Java applications,\nwhich integrates the JBoss Web Server with JBoss Hibernate and JBoss Seam.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. Red Hat JBoss Enterprise Web Platform includes OpenSSL 0.9.8e, so\nthis flaw is only exploitable when OpenSSL in JBoss EWP is used as a\nclient, communicating with a vulnerable server running OpenSSL version\n1.0.1 and above. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll users of Red Hat JBoss Enterprise Web Platform 5.2.0 as provided from\nthe Red Hat Customer Portal are advised to apply this update. The JBoss\nserver process must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0633", "url": "https://access.redhat.com/errata/RHSA-2014:0633" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/906533", "url": "https://access.redhat.com/site/solutions/906533" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform\u0026downloadType=securityPatches\u0026version=5.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform\u0026downloadType=securityPatches\u0026version=5.2.0" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0633.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update", "tracking": { "current_release_date": "2024-11-22T08:02:26+00:00", "generator": { "date": "2024-11-22T08:02:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0633", "initial_release_date": "2014-06-05T14:56:31+00:00", "revision_history": [ { "date": "2014-06-05T14:56:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-15T16:41:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Platform 5.2", "product": { "name": "Red Hat JBoss Web Platform 5.2", "product_id": "Red Hat JBoss Web Platform 5.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Platform 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T14:56:31+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting Red Hat JBoss Enterprise Web Platform installation and deployed\napplications (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Web Platform 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0633" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Platform 5.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
rhsa-2014_0680
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl098e packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0680", "url": "https://access.redhat.com/errata/RHSA-2014:0680" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0680.json" } ], "title": "Red Hat Security Advisory: openssl098e security update", "tracking": { "current_release_date": "2024-11-22T08:02:14+00:00", "generator": { "date": "2024-11-22T08:02:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0680", "initial_release_date": "2014-06-10T12:23:43+00:00", "revision_history": [ { "date": "2014-06-10T12:23:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-10T12:23:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "product": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "product_id": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-29.el7_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "product_id": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-29.el7_0.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl098e-0:0.9.8e-29.el7_0.2.i686", "product": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.i686", "product_id": "openssl098e-0:0.9.8e-29.el7_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-29.el7_0.2?arch=i686" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "product_id": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-29.el7_0.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl098e-0:0.9.8e-29.el7_0.2.src", "product": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.src", "product_id": "openssl098e-0:0.9.8e-29.el7_0.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-29.el7_0.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390", "product": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390", "product_id": "openssl098e-0:0.9.8e-29.el7_0.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-29.el7_0.2?arch=s390" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "product_id": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-29.el7_0.2?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390x", "product": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390x", "product_id": "openssl098e-0:0.9.8e-29.el7_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-29.el7_0.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "product_id": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-29.el7_0.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc", "product": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc", "product_id": "openssl098e-0:0.9.8e-29.el7_0.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-29.el7_0.2?arch=ppc" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "product_id": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-29.el7_0.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "product": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "product_id": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e@0.9.8e-29.el7_0.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "product": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "product_id": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl098e-debuginfo@0.9.8e-29.el7_0.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64" }, "product_reference": "openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64" }, "product_reference": "openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:43+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0680" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Client-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Client-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7ComputeNode-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7ComputeNode-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Server-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Server-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.i686", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.ppc64", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.s390x", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.src", "7Workstation-7.0.Z:openssl098e-0:0.9.8e-29.el7_0.2.x86_64", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.i686", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.ppc64", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.s390x", "7Workstation-7.0.Z:openssl098e-debuginfo-0:0.9.8e-29.el7_0.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
rhsa-2014_0679
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nA buffer overflow flaw was found in the way OpenSSL handled invalid DTLS\npacket fragments. A remote attacker could possibly use this flaw to execute\narbitrary code on a DTLS client or server. (CVE-2014-0195)\n\nMultiple flaws were found in the way OpenSSL handled read and write buffers\nwhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or\nserver using OpenSSL could crash or unexpectedly drop connections when\nprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)\n\nA denial of service flaw was found in the way OpenSSL handled certain DTLS\nServerHello requests. A specially crafted DTLS handshake packet could cause\na DTLS client using OpenSSL to crash. (CVE-2014-0221)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed\nanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially\ncrafted handshake packet could cause a TLS/SSL client that has the\nanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)\n\nRed Hat would like to thank the OpenSSL project for reporting these issues.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof CVE-2014-0224, J\u00fcri Aedla as the original reporter of CVE-2014-0195,\nImre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix\nGr\u00f6bert and Ivan Fratri\u0107 of Google as the original reporters of\nCVE-2014-3470.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0679", "url": "https://access.redhat.com/errata/RHSA-2014:0679" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "1087195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087195" }, { "category": "external", "summary": "1093837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093837" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "1103593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103593" }, { "category": "external", "summary": "1103598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103598" }, { "category": "external", "summary": "1103600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103600" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0679.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:21:12+00:00", "generator": { "date": "2024-11-22T08:21:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0679", "initial_release_date": "2014-06-10T12:23:51+00:00", "revision_history": [ { "date": "2014-06-10T12:23:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-10T12:23:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:21:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "product": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "product_id": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "product_id": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "product_id": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.3?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.3.src", "product": { "name": "openssl-1:1.0.1e-34.el7_0.3.src", "product_id": "openssl-1:1.0.1e-34.el7_0.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.3?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.3?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.3?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "product_id": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.3?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.3?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.3?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "product": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "product_id": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.3?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.3?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "product_id": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.3?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.3?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.3?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "product_id": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.3.s390x", "product": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x", "product_id": "openssl-1:1.0.1e-34.el7_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.3?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.3?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "product_id": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.3?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.3?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.3?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-5298", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-04-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1087195" } ], "notes": [ { "category": "description", "text": "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: freelist misuse causing a possible use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the openssl packages shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-5298" }, { "category": "external", "summary": "RHBZ#1087195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087195" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-5298", "url": "https://www.cve.org/CVERecord?id=CVE-2010-5298" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-5298", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5298" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:51+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0679" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: freelist misuse causing a possible use-after-free" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "J\u00fcri Aedla" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0195", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103598" } ], "notes": [ { "category": "description", "text": "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Buffer overflow via DTLS invalid fragment", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl as shipped with Red Hat Enterprise Linux 5. This issue does not affect the version of openssl098e as shipped with Red Hat Enterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0195" }, { "category": "external", "summary": "RHBZ#1103598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103598" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0195", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0195" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:51+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0679" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Buffer overflow via DTLS invalid fragment" }, { "cve": "CVE-2014-0198", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1093837" } ], "notes": [ { "category": "description", "text": "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the openssl packages shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0198" }, { "category": "external", "summary": "RHBZ#1093837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0198", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0198" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:51+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0679" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Imre Rad" ], "organization": "Search-Lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0221", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103593" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DoS when sending invalid DTLS handshake", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0221" }, { "category": "external", "summary": "RHBZ#1103593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103593" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0221", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0221" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:51+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0679" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DoS when sending invalid DTLS handshake" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:51+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0679" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Felix Gr\u00f6bert" ], "summary": "Acknowledged by upstream." }, { "names": [ "Ivan Fratri\u0107" ], "organization": "Google", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3470", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103600" } ], "notes": [ { "category": "description", "text": "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: client-side denial of service when using anonymous ECDH", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl and openssl097a as shipped with Red Hat Enterprise Linux 5. This issue does not affect the openssl098e as shipped with Red Hat Enterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3470" }, { "category": "external", "summary": "RHBZ#1103600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3470", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3470" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:51+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0679" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.3.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: client-side denial of service when using anonymous ECDH" } ] }
rhsa-2014_0627
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.3 and 6.4 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0627", "url": "https://access.redhat.com/errata/RHSA-2014:0627" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0627.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:02:33+00:00", "generator": { "date": "2024-11-22T08:02:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0627", "initial_release_date": "2014-06-05T12:13:04+00:00", "revision_history": [ { "date": "2014-06-05T12:13:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-05T12:13:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (v. 4 ELS)", "product": { "name": "Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES (v. 4 ELS)", "product": { "name": "Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:5.6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.9 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.9" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product": { "name": "Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product": { "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.22.el4.ia64", "product": { "name": "openssl-perl-0:0.9.7a-43.22.el4.ia64", "product_id": "openssl-perl-0:0.9.7a-43.22.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.22.el4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.22.el4.ia64", "product": { "name": "openssl-0:0.9.7a-43.22.el4.ia64", "product_id": "openssl-0:0.9.7a-43.22.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.22.el4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "product_id": "openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.22.el4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.22.el4.ia64", "product": { "name": "openssl-devel-0:0.9.7a-43.22.el4.ia64", "product_id": "openssl-devel-0:0.9.7a-43.22.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.22.el4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64", "product": { "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64", "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_6.12?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-12.el5_6.12.ia64", "product": { "name": "openssl-perl-0:0.9.8e-12.el5_6.12.ia64", "product_id": "openssl-perl-0:0.9.8e-12.el5_6.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_6.12?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-12.el5_6.12.ia64", "product": { "name": "openssl-0:0.9.8e-12.el5_6.12.ia64", "product_id": "openssl-0:0.9.8e-12.el5_6.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_6.12?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-12.el5_6.12.ia64", "product": { "name": "openssl-devel-0:0.9.8e-12.el5_6.12.ia64", "product_id": "openssl-devel-0:0.9.8e-12.el5_6.12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_6.12?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64", "product": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64", "product_id": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-26.el5_9.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-26.el5_9.4.ia64", "product": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.ia64", "product_id": "openssl-perl-0:0.9.8e-26.el5_9.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-26.el5_9.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ia64", "product": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ia64", "product_id": "openssl-devel-0:0.9.8e-26.el5_9.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-26.el5_9.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.ia64", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.ia64", "product_id": "openssl-0:0.9.8e-26.el5_9.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-43.22.el4.i686", "product": { "name": "openssl-0:0.9.7a-43.22.el4.i686", "product_id": "openssl-0:0.9.7a-43.22.el4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.22.el4?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "product_id": "openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.22.el4?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686", "product": { "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686", "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_6.12?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-12.el5_6.12.i686", "product": { "name": "openssl-0:0.9.8e-12.el5_6.12.i686", "product_id": "openssl-0:0.9.8e-12.el5_6.12.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_6.12?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686", "product": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686", "product_id": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-26.el5_9.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.i686", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.i686", "product_id": "openssl-0:0.9.8e-26.el5_9.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-25.el6_3.3.i686", "product": { "name": "openssl-0:1.0.0-25.el6_3.3.i686", "product_id": "openssl-0:1.0.0-25.el6_3.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-25.el6_3.3?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "product": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "product_id": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-25.el6_3.3?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-25.el6_3.3.i686", "product": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.i686", "product_id": "openssl-devel-0:1.0.0-25.el6_3.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-25.el6_3.3?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-25.el6_3.3.i686", "product": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.i686", "product_id": "openssl-perl-0:1.0.0-25.el6_3.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-25.el6_3.3?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-25.el6_3.3.i686", "product": { "name": "openssl-static-0:1.0.0-25.el6_3.3.i686", "product_id": "openssl-static-0:1.0.0-25.el6_3.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-25.el6_3.3?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "product": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "product_id": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-27.el6_4.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-27.el6_4.4.i686", "product": { "name": "openssl-0:1.0.0-27.el6_4.4.i686", "product_id": "openssl-0:1.0.0-27.el6_4.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-27.el6_4.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-27.el6_4.4.i686", "product": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.i686", "product_id": "openssl-devel-0:1.0.0-27.el6_4.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-27.el6_4.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-27.el6_4.4.i686", "product": { "name": "openssl-static-0:1.0.0-27.el6_4.4.i686", "product_id": "openssl-static-0:1.0.0-27.el6_4.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-27.el6_4.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-27.el6_4.4.i686", "product": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.i686", "product_id": "openssl-perl-0:1.0.0-27.el6_4.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-27.el6_4.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.7.i686", "product": { "name": "openssl-0:1.0.0-20.el6_2.7.i686", "product_id": "openssl-0:1.0.0-20.el6_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.7?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-20.el6_2.7.i686", "product": { "name": "openssl-devel-0:1.0.0-20.el6_2.7.i686", "product_id": "openssl-devel-0:1.0.0-20.el6_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-20.el6_2.7?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "product": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "product_id": "openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-20.el6_2.7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.22.el4.x86_64", "product": { "name": "openssl-perl-0:0.9.7a-43.22.el4.x86_64", "product_id": "openssl-perl-0:0.9.7a-43.22.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.22.el4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.22.el4.x86_64", "product": { "name": "openssl-0:0.9.7a-43.22.el4.x86_64", "product_id": "openssl-0:0.9.7a-43.22.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.22.el4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "product_id": "openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.22.el4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.22.el4.x86_64", "product": { "name": "openssl-devel-0:0.9.7a-43.22.el4.x86_64", "product_id": "openssl-devel-0:0.9.7a-43.22.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.22.el4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64", "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_6.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-12.el5_6.12.x86_64", "product": { "name": "openssl-perl-0:0.9.8e-12.el5_6.12.x86_64", "product_id": "openssl-perl-0:0.9.8e-12.el5_6.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_6.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-12.el5_6.12.x86_64", "product": { "name": "openssl-0:0.9.8e-12.el5_6.12.x86_64", "product_id": "openssl-0:0.9.8e-12.el5_6.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_6.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-12.el5_6.12.x86_64", "product": { "name": "openssl-devel-0:0.9.8e-12.el5_6.12.x86_64", "product_id": "openssl-devel-0:0.9.8e-12.el5_6.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_6.12?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64", "product_id": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-26.el5_9.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-26.el5_9.4.x86_64", "product": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.x86_64", "product_id": "openssl-perl-0:0.9.8e-26.el5_9.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-26.el5_9.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-26.el5_9.4.x86_64", "product": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.x86_64", "product_id": "openssl-devel-0:0.9.8e-26.el5_9.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-26.el5_9.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.x86_64", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.x86_64", "product_id": "openssl-0:0.9.8e-26.el5_9.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-25.el6_3.3.x86_64", "product": { "name": "openssl-0:1.0.0-25.el6_3.3.x86_64", "product_id": "openssl-0:1.0.0-25.el6_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-25.el6_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "product_id": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-25.el6_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "product": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "product_id": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-25.el6_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "product": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "product_id": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-25.el6_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-25.el6_3.3.x86_64", "product": { "name": "openssl-static-0:1.0.0-25.el6_3.3.x86_64", "product_id": "openssl-static-0:1.0.0-25.el6_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-25.el6_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "product_id": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-27.el6_4.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-27.el6_4.4.x86_64", "product": { "name": "openssl-0:1.0.0-27.el6_4.4.x86_64", "product_id": "openssl-0:1.0.0-27.el6_4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-27.el6_4.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-27.el6_4.4.x86_64", "product": { "name": "openssl-static-0:1.0.0-27.el6_4.4.x86_64", "product_id": "openssl-static-0:1.0.0-27.el6_4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-27.el6_4.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "product": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "product_id": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-27.el6_4.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "product": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "product_id": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-27.el6_4.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-20.el6_2.7.x86_64", "product": { "name": "openssl-static-0:1.0.0-20.el6_2.7.x86_64", "product_id": "openssl-static-0:1.0.0-20.el6_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-20.el6_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "product": { "name": "openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "product_id": "openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-20.el6_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "product_id": "openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-20.el6_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.7.x86_64", "product": { "name": "openssl-0:1.0.0-20.el6_2.7.x86_64", "product_id": "openssl-0:1.0.0-20.el6_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "product": { "name": "openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "product_id": "openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-20.el6_2.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "product_id": "openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.22.el4?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.22.el4.i386", "product": { "name": "openssl-devel-0:0.9.7a-43.22.el4.i386", "product_id": "openssl-devel-0:0.9.7a-43.22.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.22.el4?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.22.el4.i386", "product": { "name": "openssl-perl-0:0.9.7a-43.22.el4.i386", "product_id": "openssl-perl-0:0.9.7a-43.22.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.22.el4?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.22.el4.i386", "product": { "name": "openssl-0:0.9.7a-43.22.el4.i386", "product_id": "openssl-0:0.9.7a-43.22.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.22.el4?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386", "product": { "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386", "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_6.12?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-12.el5_6.12.i386", "product": { "name": "openssl-devel-0:0.9.8e-12.el5_6.12.i386", "product_id": "openssl-devel-0:0.9.8e-12.el5_6.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_6.12?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-12.el5_6.12.i386", "product": { "name": "openssl-perl-0:0.9.8e-12.el5_6.12.i386", "product_id": "openssl-perl-0:0.9.8e-12.el5_6.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_6.12?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-12.el5_6.12.i386", "product": { "name": "openssl-0:0.9.8e-12.el5_6.12.i386", "product_id": "openssl-0:0.9.8e-12.el5_6.12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_6.12?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386", "product": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386", "product_id": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-26.el5_9.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-26.el5_9.4.i386", "product": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.i386", "product_id": "openssl-devel-0:0.9.8e-26.el5_9.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-26.el5_9.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-26.el5_9.4.i386", "product": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.i386", "product_id": "openssl-perl-0:0.9.8e-26.el5_9.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-26.el5_9.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.i386", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.i386", "product_id": "openssl-0:0.9.8e-26.el5_9.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-43.22.el4.src", "product": { "name": "openssl-0:0.9.7a-43.22.el4.src", "product_id": "openssl-0:0.9.7a-43.22.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.22.el4?arch=src" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-12.el5_6.12.src", "product": { "name": "openssl-0:0.9.8e-12.el5_6.12.src", "product_id": "openssl-0:0.9.8e-12.el5_6.12.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_6.12?arch=src" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.src", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.src", "product_id": "openssl-0:0.9.8e-26.el5_9.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=src" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-25.el6_3.3.src", "product": { "name": "openssl-0:1.0.0-25.el6_3.3.src", "product_id": "openssl-0:1.0.0-25.el6_3.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-25.el6_3.3?arch=src" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-27.el6_4.4.src", "product": { "name": "openssl-0:1.0.0-27.el6_4.4.src", "product_id": "openssl-0:1.0.0-27.el6_4.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-27.el6_4.4?arch=src" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-20.el6_2.7.src", "product": { "name": "openssl-0:1.0.0-20.el6_2.7.src", "product_id": "openssl-0:1.0.0-20.el6_2.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-20.el6_2.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390", "product": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390", "product_id": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-26.el5_9.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-26.el5_9.4.s390", "product": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.s390", "product_id": "openssl-devel-0:0.9.8e-26.el5_9.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-26.el5_9.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.s390", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.s390", "product_id": "openssl-0:0.9.8e-26.el5_9.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390", "product": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390", "product_id": "openssl-devel-0:1.0.0-25.el6_3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-25.el6_3.3?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-25.el6_3.3.s390", "product": { "name": "openssl-0:1.0.0-25.el6_3.3.s390", "product_id": "openssl-0:1.0.0-25.el6_3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-25.el6_3.3?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "product": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "product_id": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-25.el6_3.3?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390", "product": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390", "product_id": "openssl-devel-0:1.0.0-27.el6_4.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-27.el6_4.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "product": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "product_id": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-27.el6_4.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-27.el6_4.4.s390", "product": { "name": "openssl-0:1.0.0-27.el6_4.4.s390", "product_id": "openssl-0:1.0.0-27.el6_4.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-27.el6_4.4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x", "product": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x", "product_id": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-26.el5_9.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-26.el5_9.4.s390x", "product": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.s390x", "product_id": "openssl-perl-0:0.9.8e-26.el5_9.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-26.el5_9.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-26.el5_9.4.s390x", "product": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.s390x", "product_id": "openssl-devel-0:0.9.8e-26.el5_9.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-26.el5_9.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.s390x", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.s390x", "product_id": "openssl-0:0.9.8e-26.el5_9.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-25.el6_3.3.s390x", "product": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.s390x", "product_id": "openssl-perl-0:1.0.0-25.el6_3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-25.el6_3.3?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-25.el6_3.3.s390x", "product": { "name": "openssl-static-0:1.0.0-25.el6_3.3.s390x", "product_id": "openssl-static-0:1.0.0-25.el6_3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-25.el6_3.3?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "product": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "product_id": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-25.el6_3.3?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390x", "product": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390x", "product_id": "openssl-devel-0:1.0.0-25.el6_3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-25.el6_3.3?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-25.el6_3.3.s390x", "product": { "name": "openssl-0:1.0.0-25.el6_3.3.s390x", "product_id": "openssl-0:1.0.0-25.el6_3.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-25.el6_3.3?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-27.el6_4.4.s390x", "product": { "name": "openssl-static-0:1.0.0-27.el6_4.4.s390x", "product_id": "openssl-static-0:1.0.0-27.el6_4.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-27.el6_4.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "product": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "product_id": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-27.el6_4.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-27.el6_4.4.s390x", "product": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.s390x", "product_id": "openssl-perl-0:1.0.0-27.el6_4.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-27.el6_4.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390x", "product": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390x", "product_id": "openssl-devel-0:1.0.0-27.el6_4.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-27.el6_4.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-27.el6_4.4.s390x", "product": { "name": "openssl-0:1.0.0-27.el6_4.4.s390x", "product_id": "openssl-0:1.0.0-27.el6_4.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-27.el6_4.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc", "product": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc", "product_id": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-26.el5_9.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-26.el5_9.4.ppc", "product": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.ppc", "product_id": "openssl-perl-0:0.9.8e-26.el5_9.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-26.el5_9.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc", "product": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc", "product_id": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-26.el5_9.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.ppc", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.ppc", "product_id": "openssl-0:0.9.8e-26.el5_9.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc", "product": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc", "product_id": "openssl-devel-0:1.0.0-25.el6_3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-25.el6_3.3?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-25.el6_3.3.ppc", "product": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc", "product_id": "openssl-0:1.0.0-25.el6_3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-25.el6_3.3?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "product": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "product_id": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-25.el6_3.3?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc", "product": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc", "product_id": "openssl-devel-0:1.0.0-27.el6_4.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-27.el6_4.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "product": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "product_id": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-27.el6_4.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-27.el6_4.4.ppc", "product": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc", "product_id": "openssl-0:1.0.0-27.el6_4.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-27.el6_4.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64", "product_id": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-26.el5_9.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc64", "product": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc64", "product_id": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-26.el5_9.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-26.el5_9.4.ppc64", "product": { "name": "openssl-0:0.9.8e-26.el5_9.4.ppc64", "product_id": "openssl-0:0.9.8e-26.el5_9.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-26.el5_9.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "product": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "product_id": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-25.el6_3.3?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-25.el6_3.3.ppc64", "product": { "name": "openssl-static-0:1.0.0-25.el6_3.3.ppc64", "product_id": "openssl-static-0:1.0.0-25.el6_3.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-25.el6_3.3?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "product_id": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-25.el6_3.3?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "product": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "product_id": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-25.el6_3.3?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-25.el6_3.3.ppc64", "product": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc64", "product_id": "openssl-0:1.0.0-25.el6_3.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-25.el6_3.3?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.0-27.el6_4.4.ppc64", "product": { "name": "openssl-static-0:1.0.0-27.el6_4.4.ppc64", "product_id": "openssl-static-0:1.0.0-27.el6_4.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.0-27.el6_4.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "product_id": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.0-27.el6_4.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "product": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "product_id": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.0-27.el6_4.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "product": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "product_id": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.0-27.el6_4.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:1.0.0-27.el6_4.4.ppc64", "product": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc64", "product_id": "openssl-0:1.0.0-27.el6_4.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.0-27.el6_4.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-0:0.9.7a-43.22.el4.i386" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.i386", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.i686 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-0:0.9.7a-43.22.el4.i686" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.i686", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-0:0.9.7a-43.22.el4.ia64" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.ia64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.src as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-0:0.9.7a-43.22.el4.src" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.src", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-0:0.9.7a-43.22.el4.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.x86_64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.i686 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.22.el4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.22.el4.i386", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.22.el4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.22.el4.ia64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.22.el4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.22.el4.x86_64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.22.el4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.22.el4.i386", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.22.el4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.22.el4.ia64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.22.el4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", "product_id": "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.22.el4.x86_64", "relates_to_product_reference": "4AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-0:0.9.7a-43.22.el4.i386" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.i386", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.i686 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-0:0.9.7a-43.22.el4.i686" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.i686", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-0:0.9.7a-43.22.el4.ia64" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.ia64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.src as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-0:0.9.7a-43.22.el4.src" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.src", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.22.el4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-0:0.9.7a-43.22.el4.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.22.el4.x86_64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.i686 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.22.el4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.22.el4.i386", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.22.el4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.22.el4.ia64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.22.el4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.22.el4.x86_64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.22.el4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.22.el4.i386", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.22.el4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.22.el4.ia64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.22.el4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", "product_id": "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.22.el4.x86_64", "relates_to_product_reference": "4ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-12.el5_6.12.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.i386" }, "product_reference": "openssl-0:0.9.8e-12.el5_6.12.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-12.el5_6.12.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.i686" }, "product_reference": "openssl-0:0.9.8e-12.el5_6.12.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-12.el5_6.12.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.ia64" }, "product_reference": "openssl-0:0.9.8e-12.el5_6.12.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-12.el5_6.12.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.src" }, "product_reference": "openssl-0:0.9.8e-12.el5_6.12.src", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-12.el5_6.12.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.x86_64" }, "product_reference": "openssl-0:0.9.8e-12.el5_6.12.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-12.el5_6.12.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.i386" }, "product_reference": "openssl-devel-0:0.9.8e-12.el5_6.12.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-12.el5_6.12.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-12.el5_6.12.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-12.el5_6.12.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-12.el5_6.12.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-12.el5_6.12.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.i386" }, "product_reference": "openssl-perl-0:0.9.8e-12.el5_6.12.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-12.el5_6.12.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-12.el5_6.12.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-12.el5_6.12.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-12.el5_6.12.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.i386" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.i386", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.i686" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.i686", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ia64" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.ia64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ppc" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.ppc", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ppc64" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.ppc64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.s390" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.s390", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.s390x" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.s390x", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.src as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.src" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.src", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-26.el5_9.4.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.x86_64" }, "product_reference": "openssl-0:0.9.8e-26.el5_9.4.x86_64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.i386" }, "product_reference": "openssl-devel-0:0.9.8e-26.el5_9.4.i386", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-26.el5_9.4.ia64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-26.el5_9.4.ppc64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.s390" }, "product_reference": "openssl-devel-0:0.9.8e-26.el5_9.4.s390", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-26.el5_9.4.s390x", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-26.el5_9.4.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-26.el5_9.4.x86_64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.i386" }, "product_reference": "openssl-perl-0:0.9.8e-26.el5_9.4.i386", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-26.el5_9.4.ia64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-26.el5_9.4.ppc", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-26.el5_9.4.s390x", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-26.el5_9.4.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", "product_id": "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-26.el5_9.4.x86_64", "relates_to_product_reference": "5Server-5.9.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.src as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.src", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node EUS (v. 6.3)", "product_id": "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.src", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", "product_id": "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.src", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3)", "product_id": "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.src", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", "product_id": "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.7.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.7.i686", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.7.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.7.src", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.7.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.7.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.7.i686", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-perl-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:openssl-static-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.src", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.3)", "product_id": "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.src", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.7.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.i686" }, "product_reference": "openssl-0:1.0.0-20.el6_2.7.i686", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.src" }, "product_reference": "openssl-0:1.0.0-20.el6_2.7.src", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.7.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.7.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.i686" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.7.i686", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-perl-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-20.el6_2.7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:openssl-static-0:1.0.0-20.el6_2.7.x86_64" }, "product_reference": "openssl-static-0:1.0.0-20.el6_2.7.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.src", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.ppc", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.s390", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.i686", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.ppc64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.s390x", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-25.el6_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.3)", "product_id": "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64" }, "product_reference": "openssl-static-0:1.0.0-25.el6_3.3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.src", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.ppc", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.s390", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.i686", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.ppc64", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.s390x", "relates_to_product_reference": "6Server-optional-6.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.0-27.el6_4.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", "product_id": "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64" }, "product_reference": "openssl-static-0:1.0.0-27.el6_4.4.x86_64", "relates_to_product_reference": "6Server-optional-6.4.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-ELS:openssl-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.i686", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.src", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.i686", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.src", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.x86_64", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.i686", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.src", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.i686", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.src", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.x86_64", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.src", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-static-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.src", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-static-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T12:13:04+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "4AS-ELS:openssl-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.i686", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.src", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.i686", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.src", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.x86_64", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.i686", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.src", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.i686", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.src", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.x86_64", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.src", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-static-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.src", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-static-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0627" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-ELS:openssl-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.i686", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.src", "4AS-ELS:openssl-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-devel-0:0.9.7a-43.22.el4.x86_64", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.i386", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.ia64", "4AS-ELS:openssl-perl-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.i686", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.src", "4ES-ELS:openssl-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.i686", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-debuginfo-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-devel-0:0.9.7a-43.22.el4.x86_64", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.i386", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.ia64", "4ES-ELS:openssl-perl-0:0.9.7a-43.22.el4.x86_64", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.i686", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.src", "5Server-5.6.LL:openssl-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.i686", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-debuginfo-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-devel-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.i386", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.ia64", "5Server-5.6.LL:openssl-perl-0:0.9.8e-12.el5_6.12.x86_64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.i686", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.src", "5Server-5.9.EUS:openssl-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.i686", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-debuginfo-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.ppc64", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.s390", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-devel-0:0.9.8e-26.el5_9.4.x86_64", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.i386", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.ia64", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.ppc", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.s390x", "5Server-5.9.EUS:openssl-perl-0:0.9.8e-26.el5_9.4.x86_64", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6ComputeNode-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6ComputeNode-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6ComputeNode-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6ComputeNode-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6ComputeNode-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6ComputeNode-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.src", "6Server-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.i686", "6Server-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.2.AUS:openssl-static-0:1.0.0-20.el6_2.7.x86_64", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6Server-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6Server-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6Server-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6Server-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.src", "6Server-optional-6.2.AUS:openssl-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-debuginfo-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.i686", "6Server-optional-6.2.AUS:openssl-devel-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-perl-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.2.AUS:openssl-static-0:1.0.0-20.el6_2.7.x86_64", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.src", "6Server-optional-6.3.EUS:openssl-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-debuginfo-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-devel-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-perl-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.i686", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.ppc64", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.s390x", "6Server-optional-6.3.EUS:openssl-static-0:1.0.0-25.el6_3.3.x86_64", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.src", "6Server-optional-6.4.EUS:openssl-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-debuginfo-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-devel-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-perl-0:1.0.0-27.el6_4.4.x86_64", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.i686", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.ppc64", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.s390x", "6Server-optional-6.4.EUS:openssl-static-0:1.0.0-27.el6_4.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
rhsa-2014_0625
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nA buffer overflow flaw was found in the way OpenSSL handled invalid DTLS\npacket fragments. A remote attacker could possibly use this flaw to execute\narbitrary code on a DTLS client or server. (CVE-2014-0195)\n\nMultiple flaws were found in the way OpenSSL handled read and write buffers\nwhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or\nserver using OpenSSL could crash or unexpectedly drop connections when\nprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)\n\nA denial of service flaw was found in the way OpenSSL handled certain DTLS\nServerHello requests. A specially crafted DTLS handshake packet could cause\na DTLS client using OpenSSL to crash. (CVE-2014-0221)\n\nA NULL pointer dereference flaw was found in the way OpenSSL performed\nanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially\ncrafted handshake packet could cause a TLS/SSL client that has the\nanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)\n\nRed Hat would like to thank the OpenSSL project for reporting these issues.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof CVE-2014-0224, J\u00fcri Aedla as the original reporter of CVE-2014-0195,\nImre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix\nGr\u00f6bert and Ivan Fratri\u0107 of Google as the original reporters of\nCVE-2014-3470.\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. For the update to take\neffect, all services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0625", "url": "https://access.redhat.com/errata/RHSA-2014:0625" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "1087195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087195" }, { "category": "external", "summary": "1093837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093837" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "1103593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103593" }, { "category": "external", "summary": "1103598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103598" }, { "category": "external", "summary": "1103600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103600" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0625.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:21:06+00:00", "generator": { "date": "2024-11-22T08:21:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0625", "initial_release_date": "2014-06-05T11:50:20+00:00", "revision_history": [ { "date": "2014-06-05T11:50:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-05T11:50:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:21:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-16.el6_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-16.el6_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-16.el6_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "product_id": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-16.el6_5.14?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "product_id": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-16.el6_5.14?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.i686", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686", "product_id": "openssl-0:1.0.1e-16.el6_5.14.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "product": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "product_id": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-16.el6_5.14?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "product": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "product_id": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-16.el6_5.14?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "product": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "product_id": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-16.el6_5.14?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.src", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.src", "product_id": "openssl-0:1.0.1e-16.el6_5.14.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "product": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "product_id": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-16.el6_5.14?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "product_id": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-16.el6_5.14?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "product": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "product_id": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-16.el6_5.14?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "product": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "product_id": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-16.el6_5.14?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "product_id": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "product": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "product_id": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-16.el6_5.14?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-16.el6_5.14?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "product": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "product_id": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-16.el6_5.14?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "product": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "product_id": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-16.el6_5.14?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.s390x", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x", "product_id": "openssl-0:1.0.1e-16.el6_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "product": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "product_id": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-16.el6_5.14?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "product_id": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-16.el6_5.14?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.s390", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390", "product_id": "openssl-0:1.0.1e-16.el6_5.14.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "product": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "product_id": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-16.el6_5.14?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "product": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "product_id": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-16.el6_5.14?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-16.el6_5.14.ppc", "product": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc", "product_id": "openssl-0:1.0.1e-16.el6_5.14.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-16.el6_5.14?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.src", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-5298", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-04-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1087195" } ], "notes": [ { "category": "description", "text": "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: freelist misuse causing a possible use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the openssl packages shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-5298" }, { "category": "external", "summary": "RHBZ#1087195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087195" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-5298", "url": "https://www.cve.org/CVERecord?id=CVE-2010-5298" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-5298", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5298" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T11:50:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: freelist misuse causing a possible use-after-free" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "J\u00fcri Aedla" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0195", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103598" } ], "notes": [ { "category": "description", "text": "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Buffer overflow via DTLS invalid fragment", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl as shipped with Red Hat Enterprise Linux 5. This issue does not affect the version of openssl098e as shipped with Red Hat Enterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0195" }, { "category": "external", "summary": "RHBZ#1103598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103598" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0195", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0195" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T11:50:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Buffer overflow via DTLS invalid fragment" }, { "cve": "CVE-2014-0198", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1093837" } ], "notes": [ { "category": "description", "text": "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the openssl packages shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0198" }, { "category": "external", "summary": "RHBZ#1093837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1093837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0198", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0198" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T11:50:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Imre Rad" ], "organization": "Search-Lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0221", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103593" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: DoS when sending invalid DTLS handshake", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0221" }, { "category": "external", "summary": "RHBZ#1103593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103593" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0221", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0221" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T11:50:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: DoS when sending invalid DTLS handshake" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T11:50:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Felix Gr\u00f6bert" ], "summary": "Acknowledged by upstream." }, { "names": [ "Ivan Fratri\u0107" ], "organization": "Google", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3470", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103600" } ], "notes": [ { "category": "description", "text": "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: client-side denial of service when using anonymous ECDH", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl and openssl097a as shipped with Red Hat Enterprise Linux 5. This issue does not affect the openssl098e as shipped with Red Hat Enterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3470" }, { "category": "external", "summary": "RHBZ#1103600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3470", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3470" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T11:50:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0625" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Client-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Client-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6ComputeNode-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6ComputeNode-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Server-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Server-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.src", "6Workstation-optional-6.5.z:openssl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-debuginfo-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-devel-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-perl-0:1.0.1e-16.el6_5.14.x86_64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.i686", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.ppc64", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.s390x", "6Workstation-optional-6.5.z:openssl-static-0:1.0.1e-16.el6_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: client-side denial of service when using anonymous ECDH" } ] }
rhsa-2014_0630
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat JBoss Enterprise Application Platform 5.2.0 that\nfixes one security issue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java\napplications, which integrates the JBoss Application Server with JBoss\nHibernate and JBoss Seam.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. Red Hat JBoss Enterprise Application Platform includes OpenSSL\n0.9.8e, so this flaw is only exploitable when OpenSSL in JBoss EAP is used\nas a client, communicating with a vulnerable server running OpenSSL version\n1.0.1 and above. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll users of Red Hat JBoss Enterprise Application Platform 5.2.0 as\nprovided from the Red Hat Customer Portal are advised to apply this update.\nThe JBoss server process must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0630", "url": "https://access.redhat.com/errata/RHSA-2014:0630" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/906533", "url": "https://access.redhat.com/site/solutions/906533" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=5.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=5.2.0" }, { "category": "external", "summary": "1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0630.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update", "tracking": { "current_release_date": "2024-11-22T08:02:49+00:00", "generator": { "date": "2024-11-22T08:02:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0630", "initial_release_date": "2014-06-05T14:56:58+00:00", "revision_history": [ { "date": "2014-06-05T14:56:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:33:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:02:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5.2", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5.2", "product_id": "Red Hat JBoss Enterprise Application Platform 5.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "KIKUCHI Masashi" ], "organization": "Lepidum", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-0224", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2014-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1103586" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SSL/TLS MITM vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "RHBZ#1103586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "category": "external", "summary": "RHSB-OpenSSL-CCS-Injection", "url": "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "category": "external", "summary": "https://access.redhat.com/site/articles/904433", "url": "https://access.redhat.com/site/articles/904433" }, { "category": "external", "summary": "https://access.redhat.com/site/solutions/905793", "url": "https://access.redhat.com/site/solutions/905793" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20140605.txt", "url": "https://www.openssl.org/news/secadv_20140605.txt" } ], "release_date": "2014-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-05T14:56:58+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting Red Hat JBoss Enterprise Application Platform installation and\ndeployed applications (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0630" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 5.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SSL/TLS MITM vulnerability" } ] }
CVE-2014-0224
Vulnerability from jvndb
▼ | Vendor | Product |
---|---|---|
OpenSSL Project | OpenSSL |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000048.html", "dc:date": "2016-12-27T11:49+09:00", "dcterms:issued": "2014-06-06T13:48+09:00", "dcterms:modified": "2016-12-27T11:49+09:00", "description": "OpenSSL improperly handles Change Cipher Spec message in the initial SSL/TLS handshake.\r\n\r\nOpenSSL contains a flaw in the implementation of the Change Cipher Spec protocol that allows a MITM (man-in-the-middle) attacker to force a server and a client to use easily guessable cryptgraphic key material during the initial SSL/TLS handshake (CWE-325).\r\n\r\nKIKUCHI Masashi of Lepidum Co. Ltd. reported this vulnerability to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000048.html", "sec:cpe": { "#text": "cpe:/a:openssl:openssl", "@product": "OpenSSL", "@vendor": "OpenSSL Project", "@version": "2.2" }, "sec:cvss": { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2014-000048", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN61247051/index.html", "@id": "JVN#61247051", "@source": "JVN" }, { "#text": "http://jvn.jp/vu/JVNVU93868849/index.html", "@id": "JVNVU#93868849", "@source": "JVN" }, { "#text": "//cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224", "@id": "CVE-2014-0224", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0224", "@id": "CVE-2014-0224", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/ciadr/vul/20140606-jvn.html", "@id": "Security Alert for OpenSSL improper handling of Change Cipher Spec message (JVN#61247051)", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://www.kb.cert.org/vuls/id/978508", "@id": "VU#978508", "@source": "CERT-VN" }, { "#text": "http://ics-cert.us-cert.gov/advisories/ICSA-14-156-01", "@id": "ICSA-14-156-01", "@source": "ICS-CERT ADVISORY" }, { "#text": "https://ics-cert.us-cert.gov/advisories/ICSA-14-198-03", "@id": "ICSA-14-198-03", "@source": "ICS-CERT ADVISORY" }, { "#text": "https://www.cert.fi/haavoittuvuudet/2014/haavoittuvuus-2014-075.html", "@id": "Haavoittuvuuksia OpenSSL-kirjastossa", "@source": "CERT-FI" }, { "#text": "https://plus.google.com/app/basic/stream/z12xhp3hbzbhhjgfm22ncvtbeua1dpaa004", "@id": "Here is the timeline from my (OpenSSL) perspective for the recent CCS Injection (MITM) vulnerability as well as the other flaws being fixed today", "@source": "Related document" }, { "#text": "http://ccsinjection.lepidum.co.jp/", "@id": "CCS Injection Vulnerability", "@source": "Related document" }, { "#text": "http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html", "@id": "How I discovered CCS Injection Vulnerability (CVE-2014-0224)", "@source": "Related document" }, { "#text": "http://www.aratana.jp/security/detail.php?id=9", "@id": "Announcement of Aratana", "@source": "Related document" }, { "#text": "http://tools.ietf.org/html/rfc5246#section-7.1", "@id": "Change Cipher Spec", "@source": "IETF" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "OpenSSL improper handling of Change Cipher Spec message" }
gsd-2014-0224
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-0224", "description": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "id": "GSD-2014-0224", "references": [ "https://www.suse.com/security/cve/CVE-2014-0224.html", "https://www.debian.org/security/2014/dsa-2950", "https://access.redhat.com/errata/RHSA-2014:0680", "https://access.redhat.com/errata/RHSA-2014:0679", "https://access.redhat.com/errata/RHSA-2014:0633", "https://access.redhat.com/errata/RHSA-2014:0632", "https://access.redhat.com/errata/RHSA-2014:0631", "https://access.redhat.com/errata/RHSA-2014:0630", "https://access.redhat.com/errata/RHSA-2014:0629", "https://access.redhat.com/errata/RHSA-2014:0628", "https://access.redhat.com/errata/RHSA-2014:0627", "https://access.redhat.com/errata/RHSA-2014:0626", "https://access.redhat.com/errata/RHSA-2014:0625", "https://access.redhat.com/errata/RHSA-2014:0624", "https://ubuntu.com/security/CVE-2014-0224", "https://advisories.mageia.org/CVE-2014-0224.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-0224.html", "https://linux.oracle.com/cve/CVE-2014-0224.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-0224" ], "details": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "id": "GSD-2014-0224", "modified": "2023-12-13T01:22:44.720611Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "59342", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59342" }, { "name": "59669", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59669" }, { "name": "59525", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59525" }, { "name": "HPSBMU03071", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2" }, { "name": "59004", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59004" }, { "name": "59530", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59530" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" }, { "name": "59824", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59824" }, { "name": "59282", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59282" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015300", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015300" }, { "name": "59215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59215" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "name": "59990", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59990" }, { "name": "59264", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59264" }, { "name": "59454", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59454" }, { "name": "58492", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58492" }, { "name": "59186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59186" }, { "name": "59188", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59188" }, { "name": "59126", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59126" }, { "name": "HPSBMU03078", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2" }, { "name": "HPSBMU03089", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015264", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015264" }, { "name": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", "refsource": "CONFIRM", "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" }, { "name": "59306", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59306" }, { "name": "RHSA-2014:0627", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0627.html" }, { "name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", "refsource": "CONFIRM", "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "name": "HPSBGN03068", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2" }, { "name": "RHSA-2014:0626", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0626.html" }, { "name": "59190", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59190" }, { "name": "58639", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58639" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676877", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877" }, { "name": "59446", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59446" }, { "name": "59529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59529" }, { "name": "59445", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59445" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "59589", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59589" }, { "name": "59894", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59894" }, { "name": "59325", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59325" }, { "name": "59354", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59354" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" }, { "name": "HPSBUX03046", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "61254", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61254" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" }, { "name": "59447", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59447" }, { "name": "1031594", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031594" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E", "refsource": "CONFIRM", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E" }, { "name": "59223", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59223" }, { "name": "58743", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58743" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "58719", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58719" }, { "name": "59449", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59449" }, { "name": "59132", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59132" }, { "name": "SSRT101818", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" }, { "name": "HPSBST03098", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2" }, { "name": "HPSBMU03058", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2" }, { "name": "59442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59442" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946" }, { "name": "HPSBOV03047", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2" }, { "name": "HPSBST03195", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" }, { "name": "59441", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59441" }, { "name": "HPSBMU03074", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2" }, { "name": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", "refsource": "CONFIRM", "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf" }, { "name": "HPSBMU03094", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2" }, { "name": "https://filezilla-project.org/versions.php?type=server", "refsource": "CONFIRM", "url": "https://filezilla-project.org/versions.php?type=server" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" }, { "name": "60567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60567" }, { "name": "59189", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59189" }, { "name": "59368", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59368" }, { "name": "MDVSA-2014:106", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106" }, { "name": "59142", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59142" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" }, { "name": "58742", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58742" }, { "name": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", "refsource": "CONFIRM", "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670" }, { "name": "RHSA-2014:0624", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0624.html" }, { "name": "59602", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59602" }, { "name": "http://www.kerio.com/support/kerio-control/release-history", "refsource": "CONFIRM", "url": "http://www.kerio.com/support/kerio-control/release-history" }, { "name": "59300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59300" }, { "name": "58930", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58930" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" }, { "name": "61815", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61815" }, { "name": "58667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58667" }, { "name": "GLSA-201407-05", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" }, { "name": "59191", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59191" }, { "name": "59284", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59284" }, { "name": "59444", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59444" }, { "name": "https://www.imperialviolet.org/2014/06/05/earlyccs.html", "refsource": "MISC", "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24037783", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783" }, { "name": "59365", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59365" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" }, { "name": "59305", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59305" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" }, { "name": "59483", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59483" }, { "name": "58385", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58385" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "59495", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59495" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" }, { "name": "FEDORA-2014-9308", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html" }, { "name": "58945", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58945" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" }, { "name": "HPSBST03106", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2" }, { "name": "59659", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59659" }, { "name": "59440", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59440" }, { "name": "openSUSE-SU-2016:0640", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "59429", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59429" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "59655", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59655" }, { "name": "59370", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59370" }, { "name": "59827", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59827" }, { "name": "58660", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58660" }, { "name": "59163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59163" }, { "name": "58716", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58716" }, { "name": "59055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59055" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" }, { "name": "59437", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59437" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754" }, { "name": "60176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60176" }, { "name": "HPSBPI03107", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2" }, { "name": "59101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59101" }, { "name": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", "refsource": "CONFIRM", "url": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx" }, { "name": "59374", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59374" }, { "name": "59063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59063" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html" }, { "name": "https://discussions.nessus.org/thread/7517", "refsource": "CONFIRM", "url": "https://discussions.nessus.org/thread/7517" }, { "name": "59310", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59310" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" }, { "name": "HPSBMU03216", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", "refsource": "CONFIRM", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" }, { "name": "IV61506", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506" }, { "name": "59502", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59502" }, { "name": "http://www.splunk.com/view/SP-CAAAM2D", "refsource": "CONFIRM", "url": "http://www.splunk.com/view/SP-CAAAM2D" }, { "name": "59878", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59878" }, { "name": "http://www.fortiguard.com/advisory/FG-IR-14-018/", "refsource": "CONFIRM", "url": "http://www.fortiguard.com/advisory/FG-IR-14-018/" }, { "name": "SUSE-SU-2015:0743", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" }, { "name": "HPSBMU03101", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676793", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793" }, { "name": "59214", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59214" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676356", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356" }, { "name": "HPSBHF03088", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2" }, { "name": "HPSBMU03057", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2" }, { "name": "http://support.citrix.com/article/CTX140876", "refsource": "CONFIRM", "url": "http://support.citrix.com/article/CTX140876" }, { "name": "59167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59167" }, { "name": "59120", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59120" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172" }, { "name": "HPSBMU03053", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2" }, { "name": "59380", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59380" }, { "name": "MDVSA-2014:105", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105" }, { "name": "59460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59460" }, { "name": "59506", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59506" }, { "name": "58939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58939" }, { "name": "SSRT101590", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "59661", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59661" }, { "name": "59514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59514" }, { "name": "59677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59677" }, { "name": "RHSA-2014:0630", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0630.html" }, { "name": "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195" }, { "name": "RHSA-2014:0632", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0632.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" }, { "name": "58745", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58745" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" }, { "name": "59438", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59438" }, { "name": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" }, { "name": "58714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58714" }, { "name": "HPSBGN03050", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2" }, { "name": "openSUSE-SU-2015:0229", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" }, { "name": "http://ccsinjection.lepidum.co.jp", "refsource": "MISC", "url": "http://ccsinjection.lepidum.co.jp" }, { "name": "59435", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59435" }, { "name": "HPSBHF03052", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2" }, { "name": "http://www.openssl.org/news/secadv_20140605.txt", "refsource": "CONFIRM", "url": "http://www.openssl.org/news/secadv_20140605.txt" }, { "name": "58615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58615" }, { "name": "HPSBST03265", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" }, { "name": "59231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59231" }, { "name": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", "refsource": "CONFIRM", "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671" }, { "name": "SUSE-SU-2015:0578", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" }, { "name": "http://support.apple.com/kb/HT6443", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6443" }, { "name": "59211", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59211" }, { "name": "58433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58433" }, { "name": "60066", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60066" }, { "name": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" }, { "name": "https://access.redhat.com/site/blogs/766093/posts/908133", "refsource": "CONFIRM", "url": "https://access.redhat.com/site/blogs/766093/posts/908133" }, { "name": "59301", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59301" }, { "name": "60522", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60522" }, { "name": "59784", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59784" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA80", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA80" }, { "name": "HPSBST03097", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2" }, { "name": "20140607 Re: More OpenSSL issues", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Jun/38" }, { "name": "HPSBMU03076", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2" }, { "name": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", "refsource": "CONFIRM", "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" }, { "name": "59135", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59135" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" }, { "name": "58759", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58759" }, { "name": "59093", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59093" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740" }, { "name": "http://puppetlabs.com/security/cve/cve-2014-0224", "refsource": "CONFIRM", "url": "http://puppetlabs.com/security/cve/cve-2014-0224" }, { "name": "59192", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59192" }, { "name": "FEDORA-2014-9301", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html" }, { "name": "HPSBMU03062", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2" }, { "name": "58579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58579" }, { "name": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", "refsource": "CONFIRM", "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf" }, { "name": "59040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59040" }, { "name": "HPSBMU03056", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2" }, { "name": "59175", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59175" }, { "name": "60819", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60819" }, { "name": "HPSBMU03051", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2" }, { "name": "59666", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59666" }, { "name": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", "refsource": "CONFIRM", "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" }, { "name": "58128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58128" }, { "name": "HPSBMU03055", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2" }, { "name": "59413", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59413" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" }, { "name": "59721", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59721" }, { "name": "HPSBHF03145", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756" }, { "name": "RHSA-2014:0680", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0680.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" }, { "name": "59012", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59012" }, { "name": "58713", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58713" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" }, { "name": "59362", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59362" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" }, { "name": "HPSBMU03070", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2" }, { "name": "RHSA-2014:0631", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0631.html" }, { "name": "59338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59338" }, { "name": "59450", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59450" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1053.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1053.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "VU#978508", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/978508" }, { "name": "1031032", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031032" }, { "name": "59287", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59287" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" }, { "name": "59491", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59491" }, { "name": "59364", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59364" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" }, { "name": "59451", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59451" }, { "name": "58977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58977" }, { "name": "https://www.novell.com/support/kb/doc.php?id=7015271", "refsource": "CONFIRM", "url": "https://www.novell.com/support/kb/doc.php?id=7015271" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" }, { "name": "60571", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60571" }, { "name": "59459", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59459" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" }, { "name": "60577", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60577" }, { "name": "59448", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59448" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441" }, { "name": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", "refsource": "CONFIRM", "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf" }, { "name": "http://www.blackberry.com/btsc/KB36051", "refsource": "CONFIRM", "url": "http://www.blackberry.com/btsc/KB36051" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755" }, { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" }, { "name": "HPSBST03103", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690" }, { "name": "59885", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59885" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" }, { "name": "59202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59202" }, { "name": "RHSA-2014:0633", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0633.html" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678" }, { "name": "59375", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59375" }, { "name": "HPSBMU03083", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2" }, { "name": "59528", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59528" }, { "name": "58337", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58337" }, { "name": "59518", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59518" }, { "name": "59389", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59389" }, { "name": "59162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59162" }, { "name": "59383", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59383" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217" }, { "name": "59490", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59490" }, { "name": "59916", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59916" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E", "refsource": "CONFIRM", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E" }, { "name": "HPSBMU03065", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" }, { "name": "IT02314", "refsource": "AIXAPAR", "url": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314" }, { "name": "59043", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59043" }, { "name": "59347", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59347" }, { "name": "60049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60049" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.0m", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.1h", "versionStartIncluding": "1.0.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.9.8za", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.9.45", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:application_processing_engine_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:cp1543-1_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.1.25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:cp1543-1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:s7-1500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:s7-1500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:rox_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.16.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:rox:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.13", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.4.2", "versionStartIncluding": "3.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.7.8", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.10.29", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0224" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-326" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openssl.org/news/secadv_20140605.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.openssl.org/news/secadv_20140605.txt" }, { "name": "http://ccsinjection.lepidum.co.jp", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://ccsinjection.lepidum.co.jp" }, { "name": "VU#978508", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/978508" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", "refsource": "CONFIRM", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441" }, { "name": "https://www.imperialviolet.org/2014/06/05/earlyccs.html", "refsource": "MISC", "tags": [ "Exploit" ], "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html" }, { "name": "https://access.redhat.com/site/blogs/766093/posts/908133", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/site/blogs/766093/posts/908133" }, { "name": "59191", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59191" }, { "name": "58579", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58579" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA80", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA80" }, { "name": "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl" }, { "name": "http://www.kerio.com/support/kerio-control/release-history", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.kerio.com/support/kerio-control/release-history" }, { "name": "59438", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59438" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" }, { "name": "59301", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59301" }, { "name": "59721", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59721" }, { "name": "59491", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59491" }, { "name": "59450", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59450" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" }, { "name": "59655", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59655" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" }, { "name": "59659", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59659" }, { "name": "58639", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58639" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" }, { "name": "58759", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58759" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" }, { "name": "59043", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59043" }, { "name": "59666", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59666" }, { "name": "59126", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59126" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740" }, { "name": "HPSBMU03070", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" }, { "name": "59055", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59055" }, { "name": "59490", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59490" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" }, { "name": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015300", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015300" }, { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" }, { "name": "59514", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59514" }, { "name": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" }, { "name": "59602", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59602" }, { "name": "59495", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59495" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015264", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015264" }, { "name": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx" }, { "name": "58930", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58930" }, { "name": "59370", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59370" }, { "name": "59012", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59012" }, { "name": "http://www.blackberry.com/btsc/KB36051", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.blackberry.com/btsc/KB36051" }, { "name": "58385", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58385" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" }, { "name": "59120", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59120" }, { "name": "59162", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59162" }, { "name": "58939", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58939" }, { "name": "59528", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59528" }, { "name": "59063", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59063" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172" }, { "name": "58128", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58128" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" }, { "name": "59442", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59442" }, { "name": "59824", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59824" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" }, { "name": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf" }, { "name": "59827", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59827" }, { "name": "59669", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59669" }, { "name": "59413", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59413" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" }, { "name": "59300", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59300" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690" }, { "name": "59383", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59383" }, { "name": "http://www.splunk.com/view/SP-CAAAM2D", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.splunk.com/view/SP-CAAAM2D" }, { "name": "https://discussions.nessus.org/thread/7517", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://discussions.nessus.org/thread/7517" }, { "name": "59885", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59885" }, { "name": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "59459", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59459" }, { "name": "58745", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58745" }, { "name": "59530", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59530" }, { "name": "59589", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59589" }, { "name": "59451", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59451" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" }, { "name": "http://www.fortiguard.com/advisory/FG-IR-14-018/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.fortiguard.com/advisory/FG-IR-14-018/" }, { "name": "59506", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59506" }, { "name": "https://filezilla-project.org/versions.php?type=server", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://filezilla-project.org/versions.php?type=server" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" }, { "name": "59894", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59894" }, { "name": "60049", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60049" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" }, { "name": "58743", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58743" }, { "name": "59342", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59342" }, { "name": "59325", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59325" }, { "name": "59354", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59354" }, { "name": "59916", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59916" }, { "name": "RHSA-2014:0624", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0624.html" }, { "name": "HPSBMU03058", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2" }, { "name": "RHSA-2014:0631", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0631.html" }, { "name": "RHSA-2014:0632", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0632.html" }, { "name": "RHSA-2014:0630", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0630.html" }, { "name": "RHSA-2014:0627", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0627.html" }, { "name": "HPSBMU03053", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2" }, { "name": "RHSA-2014:0680", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0680.html" }, { "name": "RHSA-2014:0633", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0633.html" }, { "name": "RHSA-2014:0626", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0626.html" }, { "name": "60066", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60066" }, { "name": "http://puppetlabs.com/security/cve/cve-2014-0224", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://puppetlabs.com/security/cve/cve-2014-0224" }, { "name": "59990", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59990" }, { "name": "60522", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60522" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1053.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1053.html" }, { "name": "60577", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60577" }, { "name": "59784", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59784" }, { "name": "59878", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59878" }, { "name": "60176", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60176" }, { "name": "60567", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60567" }, { "name": "60571", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60571" }, { "name": "60819", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/60819" }, { "name": "http://support.apple.com/kb/HT6443", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT6443" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "name": "HPSBST03103", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2" }, { "name": "HPSBHF03145", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "name": "HPSBST03106", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2" }, { "name": "HPSBST03097", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2" }, { "name": "HPSBPI03107", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2" }, { "name": "HPSBMU03083", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2" }, { "name": "61815", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61815" }, { "name": "1031032", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031032" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "1031594", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031594" }, { "name": "HPSBST03265", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "name": "SSRT101818", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "name": "openSUSE-SU-2015:0229", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" }, { "name": "SUSE-SU-2015:0578", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" }, { "name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBST03195", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "HPSBHF03052", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2" }, { "name": "HPSBMU03051", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2" }, { "name": "HPSBMU03065", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2" }, { "name": "HPSBMU03074", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2" }, { "name": "HPSBGN03050", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2" }, { "name": "HPSBST03098", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2" }, { "name": "HPSBMU03089", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2" }, { "name": "HPSBMU03101", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2" }, { "name": "HPSBMU03071", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2" }, { "name": "HPSBMU03055", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2" }, { "name": "HPSBUX03046", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "name": "HPSBMU03094", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2" }, { "name": "HPSBGN03068", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2" }, { "name": "HPSBMU03057", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2" }, { "name": "HPSBMU03078", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2" }, { "name": "HPSBOV03047", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2" }, { "name": "HPSBMU03076", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2" }, { "name": "HPSBMU03056", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2" }, { "name": "HPSBMU03062", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2" }, { "name": "HPSBHF03088", "refsource": "HP", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "openSUSE-SU-2016:0640", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "name": "SUSE-SU-2015:0743", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" }, { "name": "https://www.novell.com/support/kb/doc.php?id=7015271", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.novell.com/support/kb/doc.php?id=7015271" }, { "name": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671" }, { "name": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" }, { "name": "IV61506", "refsource": "AIXAPAR", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html" }, { "name": "MDVSA-2014:106", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106" }, { "name": "MDVSA-2014:105", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105" }, { "name": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24037783", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676877", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676793", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21676356", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356" }, { "name": "IT02314", "refsource": "AIXAPAR", "tags": [ "Third Party Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678" }, { "name": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948" }, { "name": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" }, { "name": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" }, { "name": "http://support.citrix.com/article/CTX140876", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.citrix.com/article/CTX140876" }, { "name": "GLSA-201407-05", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml" }, { "name": "61254", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/61254" }, { "name": "59677", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59677" }, { "name": "59661", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59661" }, { "name": "59529", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59529" }, { "name": "59525", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59525" }, { "name": "59518", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59518" }, { "name": "59502", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59502" }, { "name": "59483", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59483" }, { "name": "59460", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59460" }, { "name": "59454", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59454" }, { "name": "59449", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59449" }, { "name": "59448", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59448" }, { "name": "59447", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59447" }, { "name": "59446", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59446" }, { "name": "59445", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59445" }, { "name": "59444", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59444" }, { "name": "59441", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59441" }, { "name": "59440", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59440" }, { "name": "59437", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59437" }, { "name": "59435", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59435" }, { "name": "59429", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59429" }, { "name": "59389", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59389" }, { "name": "59380", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59380" }, { "name": "59375", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59375" }, { "name": "59374", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59374" }, { "name": "59368", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59368" }, { "name": "59365", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59365" }, { "name": "59364", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59364" }, { "name": "59362", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59362" }, { "name": "59347", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59347" }, { "name": "59338", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59338" }, { "name": "59310", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59310" }, { "name": "59306", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59306" }, { "name": "59305", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59305" }, { "name": "59287", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59287" }, { "name": "59284", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59284" }, { "name": "59282", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59282" }, { "name": "59264", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59264" }, { "name": "59231", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59231" }, { "name": "59223", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59223" }, { "name": "59215", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59215" }, { "name": "59214", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59214" }, { "name": "59211", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59211" }, { "name": "59202", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59202" }, { "name": "59192", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59192" }, { "name": "59190", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59190" }, { "name": "59189", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59189" }, { "name": "59188", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59188" }, { "name": "59186", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59186" }, { "name": "59175", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59175" }, { "name": "59167", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59167" }, { "name": "59163", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59163" }, { "name": "59142", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59142" }, { "name": "59135", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59135" }, { "name": "59132", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59132" }, { "name": "59101", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59101" }, { "name": "59093", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59093" }, { "name": "59040", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59040" }, { "name": "59004", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/59004" }, { "name": "58977", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58977" }, { "name": "58945", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58945" }, { "name": "58742", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58742" }, { "name": "58719", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58719" }, { "name": "58716", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58716" }, { "name": "58714", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58714" }, { "name": "58713", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58713" }, { "name": "58667", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58667" }, { "name": "58660", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58660" }, { "name": "58615", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58615" }, { "name": "58492", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58492" }, { "name": "58433", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58433" }, { "name": "58337", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/58337" }, { "name": "20140607 Re: More OpenSSL issues", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2014/Jun/38" }, { "name": "FEDORA-2014-9308", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html" }, { "name": "FEDORA-2014-9301", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195", "refsource": "CONFIRM", "tags": [ "Not Applicable" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629", "refsource": "CONFIRM", "tags": [ "Not Applicable" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "tags": [ "Not Applicable", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", "refsource": "MISC", "tags": [ "Broken Link" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2 } }, "lastModifiedDate": "2022-08-16T13:30Z", "publishedDate": "2014-06-05T21:55Z" } } }
ghsa-84gm-v5wh-659w
Vulnerability from github
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
{ "affected": [], "aliases": [ "CVE-2014-0224" ], "database_specific": { "cwe_ids": [ "CWE-326" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-06-05T21:55:00Z", "severity": "HIGH" }, "details": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "id": "GHSA-84gm-v5wh-659w", "modified": "2022-05-13T01:05:13Z", "published": "2022-05-13T01:05:13Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224" }, { "type": "WEB", "url": "https://www.novell.com/support/kb/doc.php?id=7015271" }, { "type": "WEB", "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf" }, { "type": "WEB", "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf" }, { "type": "WEB", "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html" }, { "type": "WEB", "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671" }, { "type": "WEB", "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10075" }, { "type": "WEB", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA80" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441" }, { "type": "WEB", "url": "https://filezilla-project.org/versions.php?type=server" }, { "type": "WEB", "url": "https://discussions.nessus.org/thread/7517" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "type": "WEB", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" }, { "type": "WEB", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" }, { "type": "WEB", "url": "https://access.redhat.com/site/blogs/766093/posts/908133" }, { "type": "WEB", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" }, { "type": "WEB", "url": "http://ccsinjection.lepidum.co.jp" }, { "type": "WEB", "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" }, { "type": "WEB", "url": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10629" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29195" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=KB29217" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2014-1053.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "type": "WEB", "url": "http://puppetlabs.com/security/cve/cve-2014-0224" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0624.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0626.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0627.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0630.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0631.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0632.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0633.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0680.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Jun/38" }, { "type": "WEB", "url": "http://secunia.com/advisories/58128" }, { "type": "WEB", "url": "http://secunia.com/advisories/58337" }, { "type": "WEB", "url": "http://secunia.com/advisories/58385" }, { "type": "WEB", "url": "http://secunia.com/advisories/58433" }, { "type": "WEB", "url": "http://secunia.com/advisories/58492" }, { "type": "WEB", "url": "http://secunia.com/advisories/58579" }, { "type": "WEB", "url": "http://secunia.com/advisories/58615" }, { "type": "WEB", "url": "http://secunia.com/advisories/58639" }, { "type": "WEB", "url": "http://secunia.com/advisories/58660" }, { "type": "WEB", "url": "http://secunia.com/advisories/58667" }, { "type": "WEB", "url": "http://secunia.com/advisories/58713" }, { "type": "WEB", "url": "http://secunia.com/advisories/58714" }, { "type": "WEB", "url": "http://secunia.com/advisories/58716" }, { "type": "WEB", "url": "http://secunia.com/advisories/58719" }, { "type": "WEB", "url": "http://secunia.com/advisories/58742" }, { "type": "WEB", "url": "http://secunia.com/advisories/58743" }, { "type": "WEB", "url": "http://secunia.com/advisories/58745" }, { "type": "WEB", "url": "http://secunia.com/advisories/58759" }, { "type": "WEB", "url": "http://secunia.com/advisories/58930" }, { "type": "WEB", "url": "http://secunia.com/advisories/58939" }, { "type": "WEB", "url": "http://secunia.com/advisories/58945" }, { "type": "WEB", "url": "http://secunia.com/advisories/58977" }, { "type": "WEB", "url": "http://secunia.com/advisories/59004" }, { "type": "WEB", "url": "http://secunia.com/advisories/59012" }, { "type": "WEB", "url": "http://secunia.com/advisories/59040" }, { "type": "WEB", "url": "http://secunia.com/advisories/59043" }, { "type": "WEB", "url": "http://secunia.com/advisories/59055" }, { "type": "WEB", "url": "http://secunia.com/advisories/59063" }, { "type": "WEB", "url": "http://secunia.com/advisories/59093" }, { "type": "WEB", "url": "http://secunia.com/advisories/59101" }, { "type": "WEB", "url": "http://secunia.com/advisories/59120" }, { "type": "WEB", "url": "http://secunia.com/advisories/59126" }, { "type": "WEB", "url": "http://secunia.com/advisories/59132" }, { "type": "WEB", "url": "http://secunia.com/advisories/59135" }, { "type": "WEB", "url": "http://secunia.com/advisories/59142" }, { "type": "WEB", "url": "http://secunia.com/advisories/59162" }, { "type": "WEB", "url": "http://secunia.com/advisories/59163" }, { "type": "WEB", "url": "http://secunia.com/advisories/59167" }, { "type": "WEB", "url": "http://secunia.com/advisories/59175" }, { "type": "WEB", "url": "http://secunia.com/advisories/59186" }, { "type": "WEB", "url": "http://secunia.com/advisories/59188" }, { "type": "WEB", "url": "http://secunia.com/advisories/59189" }, { "type": "WEB", "url": "http://secunia.com/advisories/59190" }, { "type": "WEB", "url": "http://secunia.com/advisories/59191" }, { "type": "WEB", "url": "http://secunia.com/advisories/59192" }, { "type": "WEB", "url": "http://secunia.com/advisories/59202" }, { "type": "WEB", "url": "http://secunia.com/advisories/59211" }, { "type": "WEB", "url": "http://secunia.com/advisories/59214" }, { "type": "WEB", "url": "http://secunia.com/advisories/59215" }, { "type": "WEB", "url": "http://secunia.com/advisories/59223" }, { "type": "WEB", "url": "http://secunia.com/advisories/59231" }, { "type": "WEB", "url": "http://secunia.com/advisories/59264" }, { "type": "WEB", "url": "http://secunia.com/advisories/59282" }, { "type": "WEB", "url": "http://secunia.com/advisories/59284" }, { "type": "WEB", "url": "http://secunia.com/advisories/59287" }, { "type": "WEB", "url": "http://secunia.com/advisories/59300" }, { "type": "WEB", "url": "http://secunia.com/advisories/59301" }, { "type": "WEB", "url": "http://secunia.com/advisories/59305" }, { "type": "WEB", "url": "http://secunia.com/advisories/59306" }, { "type": "WEB", "url": "http://secunia.com/advisories/59310" }, { "type": "WEB", "url": "http://secunia.com/advisories/59325" }, { "type": "WEB", "url": "http://secunia.com/advisories/59338" }, { "type": "WEB", "url": "http://secunia.com/advisories/59342" }, { "type": "WEB", "url": "http://secunia.com/advisories/59347" }, { "type": "WEB", "url": "http://secunia.com/advisories/59354" }, { "type": "WEB", "url": "http://secunia.com/advisories/59362" }, { "type": "WEB", "url": "http://secunia.com/advisories/59364" }, { "type": "WEB", "url": "http://secunia.com/advisories/59365" }, { "type": "WEB", "url": "http://secunia.com/advisories/59368" }, { "type": "WEB", "url": "http://secunia.com/advisories/59370" }, { "type": "WEB", "url": "http://secunia.com/advisories/59374" }, { "type": "WEB", "url": "http://secunia.com/advisories/59375" }, { "type": "WEB", "url": "http://secunia.com/advisories/59380" }, { "type": "WEB", "url": "http://secunia.com/advisories/59383" }, { "type": "WEB", "url": "http://secunia.com/advisories/59389" }, { "type": "WEB", "url": "http://secunia.com/advisories/59413" }, { "type": "WEB", "url": "http://secunia.com/advisories/59429" }, { "type": "WEB", "url": "http://secunia.com/advisories/59435" }, { "type": "WEB", "url": "http://secunia.com/advisories/59437" }, { "type": "WEB", "url": "http://secunia.com/advisories/59438" }, { "type": "WEB", "url": "http://secunia.com/advisories/59440" }, { "type": "WEB", "url": "http://secunia.com/advisories/59441" }, { "type": "WEB", "url": "http://secunia.com/advisories/59442" }, { "type": "WEB", "url": "http://secunia.com/advisories/59444" }, { "type": "WEB", "url": "http://secunia.com/advisories/59445" }, { "type": "WEB", "url": "http://secunia.com/advisories/59446" }, { "type": "WEB", "url": "http://secunia.com/advisories/59447" }, { "type": "WEB", "url": "http://secunia.com/advisories/59448" }, { "type": "WEB", "url": "http://secunia.com/advisories/59449" }, { "type": "WEB", "url": "http://secunia.com/advisories/59450" }, { "type": "WEB", "url": "http://secunia.com/advisories/59451" }, { "type": "WEB", "url": "http://secunia.com/advisories/59454" }, { "type": "WEB", "url": "http://secunia.com/advisories/59459" }, { "type": "WEB", "url": "http://secunia.com/advisories/59460" }, { "type": "WEB", "url": "http://secunia.com/advisories/59483" }, { "type": "WEB", "url": "http://secunia.com/advisories/59490" }, { "type": "WEB", "url": "http://secunia.com/advisories/59491" }, { "type": "WEB", "url": "http://secunia.com/advisories/59495" }, { "type": "WEB", "url": "http://secunia.com/advisories/59502" }, { "type": "WEB", "url": "http://secunia.com/advisories/59506" }, { "type": "WEB", "url": "http://secunia.com/advisories/59514" }, { "type": "WEB", "url": "http://secunia.com/advisories/59518" }, { "type": "WEB", "url": "http://secunia.com/advisories/59525" }, { "type": "WEB", "url": "http://secunia.com/advisories/59528" }, { "type": "WEB", "url": "http://secunia.com/advisories/59529" }, { "type": "WEB", "url": "http://secunia.com/advisories/59530" }, { "type": "WEB", "url": "http://secunia.com/advisories/59589" }, { "type": "WEB", "url": "http://secunia.com/advisories/59602" }, { "type": "WEB", "url": "http://secunia.com/advisories/59655" }, { "type": "WEB", "url": "http://secunia.com/advisories/59659" }, { "type": "WEB", "url": "http://secunia.com/advisories/59661" }, { "type": "WEB", "url": "http://secunia.com/advisories/59666" }, { "type": "WEB", "url": "http://secunia.com/advisories/59669" }, { "type": "WEB", "url": "http://secunia.com/advisories/59677" }, { "type": "WEB", "url": "http://secunia.com/advisories/59721" }, { "type": "WEB", "url": "http://secunia.com/advisories/59784" }, { "type": "WEB", "url": "http://secunia.com/advisories/59824" }, { "type": "WEB", "url": "http://secunia.com/advisories/59827" }, { "type": "WEB", "url": "http://secunia.com/advisories/59878" }, { "type": "WEB", "url": "http://secunia.com/advisories/59885" }, { "type": "WEB", "url": "http://secunia.com/advisories/59894" }, { "type": "WEB", "url": "http://secunia.com/advisories/59916" }, { "type": "WEB", "url": "http://secunia.com/advisories/59990" }, { "type": "WEB", "url": "http://secunia.com/advisories/60049" }, { "type": "WEB", "url": "http://secunia.com/advisories/60066" }, { "type": "WEB", "url": "http://secunia.com/advisories/60176" }, { "type": "WEB", "url": "http://secunia.com/advisories/60522" }, { "type": "WEB", "url": "http://secunia.com/advisories/60567" }, { "type": "WEB", "url": "http://secunia.com/advisories/60571" }, { "type": "WEB", "url": "http://secunia.com/advisories/60577" }, { "type": "WEB", "url": "http://secunia.com/advisories/60819" }, { "type": "WEB", "url": "http://secunia.com/advisories/61254" }, { "type": "WEB", "url": "http://secunia.com/advisories/61815" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT6443" }, { "type": "WEB", "url": "http://support.citrix.com/article/CTX140876" }, { "type": "WEB", "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" }, { "type": "WEB", "url": "http://www.blackberry.com/btsc/KB36051" }, { "type": "WEB", "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" }, { "type": "WEB", "url": "http://www.fortiguard.com/advisory/FG-IR-14-018" }, { "type": "WEB", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783" }, { "type": "WEB", "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/978508" }, { "type": "WEB", "url": "http://www.kerio.com/support/kerio-control/release-history" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "type": "WEB", "url": "http://www.novell.com/support/kb/doc.php?id=7015264" }, { "type": "WEB", "url": "http://www.novell.com/support/kb/doc.php?id=7015300" }, { "type": "WEB", "url": "http://www.openssl.org/news/secadv_20140605.txt" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1031032" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1031594" }, { "type": "WEB", "url": "http://www.splunk.com/view/SP-CAAAM2D" }, { "type": "WEB", "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "type": "WEB", "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" }, { "type": "WEB", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6060\u0026myns=phmc\u0026mync=E" }, { "type": "WEB", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=6061\u0026myns=phmc\u0026mync=E" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
var-201406-0445
Vulnerability from variot
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability. OpenSSL is vulnerable to a man-in-the-middle attack. Successfully exploiting this issue may allow attackers to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks.
HP IceWall SSO Dfw and MCRP
If possible, do not use SHOST setting which allows IceWall SSO Dfw or MCRP to use SSL/TLS for back-end web server connection.
HP IceWall SSO Dfw Certd
If possible, set LDAPSSL to 0 to make HP SSO IceWall Certd to not use SSL/TLS on any connection with LDAP server.
Note: The HP IceWall product is only available in Japan. Please note that version 7.3.3 of HP Insight Control server migration is included on the HP Insight Management 7.3 Update 2 DVD.
HP has provided the installation binaries for download from the following web site by using the Receive for free option:
http://h18013.www1.hp.com/products/servers/management/fpdownload.html
Customers using HP Insight Control server migration v7.2.2 must first upgrade from v7.2.2 to v7.3 by using the HP Insight Management v7.3 DVD, and then upgrade to v7.3.3 by using the HP Insight Management v7.3 Update 2 DVD.
Customers running HP Insight Control server migration v7.3, v7.3.1, or v7.3.2, can use the HP Insight Control server migration v7.3 Update 2 DVD to complete the upgrade.
For more information on the upgrade process, please refer to the HP Insight Management Installation and Upgrade Guide and Release notes, which are available at the following location:
http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind ex.aspx?cat=insightmanagement
NOTE: The upgrade paths described above update the entire HP Insight Control software stack. To upgrade HP Insight Control server migration only, complete the following steps:
Copy "hpsmp.exe" to the local machine from the HP Insight Management v7.3.0 Update 2 DVD ISO. Create batch file with the following commands: @echo off hpsmp.exe /verysilent /SVCPATCH=Install_Through_Patch Copy the batch file to the folder where "hpsmp.exe" normally resides on the target system. Double click on the batch file. The HP Insight Control server migration installation starts in a command prompt. The command prompt closes when the installation finishes. After the installation completes it creates a log file (ICmigr.log) and an output file (ICmigroutput.xml) on the target system. Do not close or click on the command prompt while the process is completing. Do not run the command prompt in the background.
HISTORY Version:1 (rev.1) - 23 July 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. The updates are available from https://h20392.www2.hp.com/portal/swdepot/displayP roductInfo.do?productNumber=OPENSSL11I
HP-UX Release HP-UX OpenSSL version
B.11.11 (11i v1) A.00.09.08za.001_HP-UX_B.11.11_32+64.depot
B.11.23 (11i v2) A.00.09.08za.002_HP-UX_B.11.23_IA-PA.depot
B.11.31 (11i v3) A.00.09.08za.003_HP-UX_B.11.31_IA-PA.depot
MANUAL ACTIONS: Yes - Update
Install OpenSSL A.00.09.08za or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant. ============================================================================ Ubuntu Security Notice USN-2232-3 June 23, 2014
openssl regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
USN-2232-1 introduced a regression in OpenSSL. The upstream fix for CVE-2014-0224 caused a regression for certain applications that use renegotiation, such as PostgreSQL. This update fixes the problem.
Original advisory details:
J=C3=BCri Aedla discovered that OpenSSL incorrectly handled invalid DTLS fragments. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-0195) Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2014-0221) KIKUCHI Masashi discovered that OpenSSL incorrectly handled certain handshakes. (CVE-2014-0224) Felix Gr=C3=B6bert and Ivan Fratri=C4=87 discovered that OpenSSL incorrectly handled anonymous ECDH ciphersuites. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-3470)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.4
Ubuntu 13.10: libssl1.0.0 1.0.1e-3ubuntu1.6
Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.16
Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.19
After a standard system update you need to reboot your computer to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2232-3 http://www.ubuntu.com/usn/usn-2232-1 https://launchpad.net/bugs/1332643
Package Information: https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4 https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6 https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16 https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04347622
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04347622 Version: 1
HPSBHF03052 rev.1 - HP Intelligent Management Center (iMC), HP Network Products including H3C and 3COM Routers and Switches running OpenSSL, Remote Denial of Service (DoS), Code Execution, Unauthorized Access, Modification or Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2014-06-20 Last Updated: 2014-06-20
Potential Security Impact: Remote Denial of Service (DoS), code execution, unauthorized access, modification of information, disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Intelligent Management Center (iMC), HP Network Products including 3COM and H3C routers and switches running OpenSSL. The vulnerabilities could be exploited remotely to create a Denial of Service (DoS), execute code, allow unauthorized access, modify or disclose information.
References:
CVE-2010-5298 Remote Denial of Service (DoS) or Modification of Information CVE-2014-0198 Remote Unauthorized Access (only iMC impacted) CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information SSRT101561 Note: All products listed are impacted by CVE-2014-0224 . iMC is also impacted by CVE-2014-0198 and CVE-2010-5298
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION section below for a list of impacted products.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2010-5298 (AV:N/AC:H/Au:N/C:N/I:P/A:P) 4.0 CVE-2014-0198 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION On June 5th 2014, OpenSSL.org issued an advisory with several CVE vulnerabilities. HP Networking is working to release fixes for these vulnerabilities that impact the products in the table below. As fixed software is made available, this security bulletin will be updated to show the fixed versions. Until the software fixes are available, HP Networking is providing the following information including possible workarounds to mitigate the risks of these vulnerabilities.
Description
The most serious issue reported is CVE-2014-0224 and it is the one discussed here. To take advantage CVE-2014-0224, an attacker must:
be in between the OpenSSL client and OpenSSL server. be capable of intercepting and modifying packets between the OpenSSL client and OpenSSL server in real time.
Workarounds
HP Networking equipment is typically deployed inside firewalls and access to management interfaces and other protocols is more tightly controlled than in public environments. This deployment and security restrictions help to reduce the possibility of an attacker being able to intercept both OpenSSL client and OpenSSL server traffic.
Following the guidelines in the Hardening Comware-based devices can help to further reduce man-in-the-middle opportunities:
http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=c03536 920
For an HP Networking device acting as an OpenSSL Server, using a patched OpenSSL client or non-OpenSSL client eliminates the risk. As an example, most modern web browsers do not use the OpenSSL client and the sessions between the HP Networking OpenSSL server and the non-OpenSSL client are not at risk for this attack. For HP Networking Equipment that is using an OpenSSL client, patching the OpenSSL server will eliminate the risk of this attack.
Protocol Notes
The following details the protocols that use OpenSSL in Comware v5 and Comware v7:
Comware V7:
Server:
FIPS/HTTPS/Load Balancing/Session Initiation Protocol
Client:
Load Balancing/OpenFlow/Session Initiation Protocol/State Machine Based Anti-Spoofing/Dynamic DNS
Comware V5:
Server:
CAPWAP/EAP/SSLVPN
Client:
Dynamic DNS
Family Fixed Version HP Branded Products Impacted H3C Branded Products Impacted 3Com Branded Products Impacted
12900 Switch Series Fix in progress use mitigations JG619A HP FF 12910 Switch AC Chassis JG621A HP FF 12910 Main Processing Unit JG632A HP FF 12916 Switch AC Chassis JG634A HP FF 12916 Main Processing Unit
12500 Fix in progress use mitigations JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JC072B HP 12500 Main Processing Unit JC808A HP 12500 TAA Main Processing Unit H3C S12508 Routing Switch(AC-1) (0235A0GE) H3C S12518 Routing Switch(AC-1) (0235A0GF) H3C S12508 Chassis (0235A0E6) H3C S12508 Chassis (0235A38N) H3C S12518 Chassis (0235A0E7) H3C S12518 Chassis (0235A38M)
12500 (Comware v7) Fix in progress use mitigations JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JC072B HP 12500 Main Processing Unit JG497A HP 12500 MPU w/Comware V7 OS JG782A HP FF 12508E AC Switch Chassis JG783A HP FF 12508E DC Switch Chassis JG784A HP FF 12518E AC Switch Chassis JG785A HP FF 12518E DC Switch Chassis JG802A HP FF 12500E MPU H3C S12508 Routing Switch(AC-1) (0235A0GE) H3C S12518 Routing Switch(AC-1) (0235A0GF) H3C S12508 Chassis (0235A0E6) H3C S12508 Chassis (0235A38N) H3C S12518 Chassis (0235A0E7) H3C S12518 Chassis (0235A38M)
11900 Switch Series Fix in progress use mitigations JG608A HP FF 11908-V Switch Chassis JG609A HP FF 11900 Main Processing Unit
10500 Switch Series (Comware v5) Fix in progress use mitigations JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC614A HP 10500 Main Processing Unit JC748A HP 10512 Switch Chassis JG375A HP 10500 TAA Main Processing Unit JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis
10500 Switch Series (Comware v7) Fix in progress use mitigations JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC748A HP 10512 Switch Chassis JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis JG496A HP 10500 Type A MPU w/Comware v7 OS
9500E Fix in progress use mitigations JC124A HP A9508 Switch Chassis JC124B HP 9505 Switch Chassis JC125A HP A9512 Switch Chassis JC125B HP 9512 Switch Chassis JC474A HP A9508-V Switch Chassis JC474B HP 9508-V Switch Chassis H3C S9505E Routing-Switch Chassis (0235A0G6) H3C S9508E-V Routing-Switch Chassis (0235A38Q) H3C S9512E Routing-Switch Chassis (0235A0G7) H3C S9508E-V Routing-Switch Chassis (0235A38Q) H3C S9505E Chassis w/ Fans (0235A38P) H3C S9512E Chassis w/ Fans (0235A38R)
Router 8800 Fix in progress use mitigations JC147A HP A8802 Router Chassis JC147B HP 8802 Router Chassis JC148A HP A8805 Router Chassis JC148B HP 8805 Router Chassis JC149A HP A8808 Router Chassis JC149B HP 8808 Router Chassis JC150A HP A8812 Router Chassis JC150B HP 8812 Router Chassis JC141A HP 8802 Main Control Unit Module JC138A HP 8805/08/12 (1E) Main Cntrl Unit Mod JC137A HP 8805/08/12 (2E) Main Cntrl Unit Mod H3C SR8805 10G Core Router Chassis (0235A0G8) H3C SR8808 10G Core Router Chassis (0235A0G9) H3C SR8812 10G Core Router Chassis (0235A0GA) H3C SR8802 10G Core Router Chassis (0235A0GC) H3C SR8802 10G Core Router Chassis (0235A31B) H3C SR8805 10G Core Router Chassis (0235A31C) H3C SR8808 10G Core Router Chassis (0235A31D) H3C SR8812 10G Core Router Chassis (0235A31E)
7500 Switch Series Fix in progress use mitigations JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T JC697A HP A7502 TAA Main Processing Unit JC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE JC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE JC700A HP A7500 384 Gbps TAA Fabric / MPU JC701A HP A7510 768 Gbps TAA Fabric / MPU JD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports JD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports JD194A HP 384 Gbps Fabric A7500 Module JD194B HP 7500 384Gbps Fabric Module JD195A HP 7500 384Gbps Advanced Fabric Module JD196A HP 7502 Fabric Module JD220A HP 7500 768Gbps Fabric Module JD238A HP A7510 Switch Chassis JD238B HP 7510 Switch Chassis JD239A HP A7506 Switch Chassis JD239B HP 7506 Switch Chassis JD240A HP A7503 Switch Chassis JD240B HP 7503 Switch Chassis JD241A HP A7506 Vertical Switch Chassis JD241B HP 7506-V Switch Chassis JD242A HP A7502 Switch Chassis JD242B HP 7502 Switch Chassis JD243A HP A7503 Switch Chassis w/1 Fabric Slot JD243B HP 7503-S Switch Chassis w/1 Fabric Slot H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4) H3C S7503E Ethernet Switch Chassis with Fan (0235A0G2) H3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5) H3C S7506E Ethernet Switch Chassis with Fan (0235A0G1) H3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3) H3C S7510E Ethernet Switch Chassis with Fan (0235A0G0) H3C S7502E Chassis w/ fans (0235A29A) H3C S7503E Chassis w/ fans (0235A27R) H3C S7503E-S Chassis w/ fans (0235A33R) H3C S7506E Chassis w/ fans (0235A27Q) H3C S7506E-V Chassis w/ fans (0235A27S)
HSR6800 Fix in progress use mitigations JG361A HP HSR6802 Router Chassis JG362A HP HSR6804 Router Chassis JG363A HP HSR6808 Router Chassis JG364A HP HSR6800 RSE-X2 Router MPU JG779A HP HSR6800 RSE-X2 Router TAA MPU
HSR6800 Russian Version Fix in progress use mitigations JG361A HP HSR6802 Router Chassis JG362A HP HSR6804 Router Chassis JG363A HP HSR6808 Router Chassis JG364A HP HSR6800 RSE-X2 Router MPU JG779A HP HSR6800 RSE-X2 Router TAA MPU
HSR6602 Fix in progress use mitigations JG353A HP HSR6602-G Router JG354A HP HSR6602-XG Router JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router
HSR6602 Russian Version Fix in progress use mitigations JG353A HP HSR6602-G Router JG354A HP HSR6602-XG Router JG776A HP HSR6602-G TAA Router JG777A HP HSR6602-XG TAA Router
A6600 Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JC566A HP A6600 RSE-X1 Main Processing Unit JG780A HP 6600 RSE-X1 Router TAA MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)
A6600 Russian Version Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JC566A HP A6600 RSE-X1 Main Processing Unit JG780A HP 6600 RSE-X1 Router TAA MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)
6600 MCP Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU JG356A HP 6600 MCP-X2 Router MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)
6600 MCP Russian Version Fix in progress use mitigations JC177A HP 6608 Router JC177B HP A6608 Router Chassis JC178A HP 6604 Router Chassis JC178B HP A6604 Router Chassis JC496A HP 6616 Router Chassis JG778A HP 6600 MCP-X2 Router TAA MPU JG355A HP 6600 MCP-X1 Router MPU JG356A HP 6600 MCP-X2 Router MPU H3C RT-SR6608-OVS-H3 (0235A32X) H3C RT-SR6604-OVS-H3 (0235A37X) H3C SR6616 Router Chassis (0235A41D)
5920 Switch Series Fix in progress use mitigations JG296A HP 5920AF-24XG Switch JG555A HP 5920AF-24XG TAA Switch
5900 Switch Series Fix in progress use mitigations JC772A HP 5900AF-48XG-4QSFP+ Switch JG336A HP 5900AF-48XGT-4QSFP+ Switch JG510A HP 5900AF-48G-4XG-2QSFP+ Switch JG554A HP 5900AF-48XG-4QSFP+ TAA Switch JG838A HP FF 5900CP-48XG-4QSFP+ Switch
5900 Virtual Switch Fix in progress use mitigations JG814AAE HP Virtual Switch 5900v VMware E-LTU JG815AAE HP VSO SW for 5900v VMware E-LTU
5830 Switch Series Fix in progress use mitigations JC691A HP A5830AF-48G Switch w/1 Interface Slot JC694A HP A5830AF-96G Switch JG316A HP 5830AF-48G TAA Switch w/1 Intf Slot JG374A HP 5830AF-96G TAA Switch
5820 Switch Series Fix in progress use mitigations JC102A HP 5820-24XG-SFP+ Switch JC106A HP 5820-14XG-SFP+ Switch with 2 Slots JG219A HP 5820AF-24XG Switch JG243A HP 5820-24XG-SFP+ TAA-compliant Switch JG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media modules Plus OSM (0235A37L) H3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T (RJ45) (0235A370)
5800 Switch Series Fix in progress use mitigations JC099A HP 5800-24G-PoE Switch JC100A HP 5800-24G Switch JC101A HP 5800-48G Switch with 2 Slots JC103A HP 5800-24G-SFP Switch JC104A HP 5800-48G-PoE Switch JC105A HP 5800-48G Switch JG225A HP 5800AF-48G Switch JG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots JG254A HP 5800-24G-PoE+ TAA-compliant Switch JG255A HP 5800-24G TAA-compliant Switch JG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt JG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot JG258A HP 5800-48G TAA Switch w 1 Intf Slot H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot (0235A36U) H3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X (SFP Plus ) Plus 1 media module PoE (0235A36S) H3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus media module (no power) (0235A374) H3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus ) Plus media module (0235A379) H3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module (0235A378) H3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM (0235A36W)
5500 HI Switch Series Fix in progress use mitigations JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch JG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch JG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt JG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt JG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt JG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt JG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt JG681A HP 5500-24G-SFP HI TAA Swch w/2Slt
5500 EI Switch Series Fix in progress use mitigations JD373A HP 5500-24G DC EI Switch JD374A HP 5500-24G-SFP EI Switch JD375A HP 5500-48G EI Switch JD376A HP 5500-48G-PoE EI Switch JD377A HP 5500-24G EI Switch JD378A HP 5500-24G-PoE EI Switch JD379A HP 5500-24G-SFP DC EI Switch JG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts JG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts JG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts JG250A HP 5500-24G EI TAA Switch w 2 Intf Slts JG251A HP 5500-48G EI TAA Switch w 2 Intf Slts JG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts JG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts H3C S5500-28C-EI Ethernet Switch (0235A253) H3C S5500-28F-EI Eth Switch AC Single (0235A24U) H3C S5500-52C-EI Ethernet Switch (0235A24X) H3C S5500-28C-EI-DC Ethernet Switch (0235A24S) H3C S5500-28C-PWR-EI Ethernet Switch (0235A255) H3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259) H3C S5500-52C-PWR-EI Ethernet Switch (0235A251)
5500 SI Switch Series Fix in progress use mitigations JD369A HP 5500-24G SI Switch JD370A HP 5500-48G SI Switch JD371A HP 5500-24G-PoE SI Switch JD372A HP 5500-48G-PoE SI Switch JG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts JG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts H3C S5500-28C-SI Ethernet Switch (0235A04U) H3C S5500-52C-SI Ethernet Switch (0235A04V) H3C S5500-28C-PWR-SI Ethernet Switch (0235A05H) H3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)
5120 EI Switch Series Fix in progress use mitigations JE066A HP 5120-24G EI Switch JE067A HP 5120-48G EI Switch JE068A HP 5120-24G EI Switch with 2 Slots JE069A HP 5120-48G EI Switch with 2 Slots JE070A HP 5120-24G-PoE EI Switch with 2 Slots JE071A HP 5120-48G-PoE EI Switch with 2 Slots JG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts JG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts JG245A HP 5120-24G EI TAA Switch w 2 Intf Slts JG246A HP 5120-48G EI TAA Switch w 2 Intf Slts JG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts JG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ) H3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS) H3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR) H3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT) H3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU) H3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)
5120 SI switch Series Fix in progress use mitigations JE072A HP 5120-48G SI Switch JE073A HP 5120-16G SI Switch JE074A HP 5120-24G SI Switch JG091A HP 5120-24G-PoE+ (370W) SI Switch JG092A HP 5120-24G-PoE+ (170W) SI Switch H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W) H3C S5120-20P-SI L2 16GE Plus 4SFP (0235A42B) H3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D) H3C S5120-28P-HPWR-SI (0235A0E5) H3C S5120-28P-PWR-SI (0235A0E3)
4800 G Switch Series Fix in progress use mitigations JD007A HP 4800-24G Switch JD008A HP 4800-24G-PoE Switch JD009A HP 4800-24G-SFP Switch JD010A HP 4800-48G Switch JD011A HP 4800-48G-PoE Switch
3Com Switch 4800G 24-Port (3CRS48G-24-91) 3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91) 3Com Switch 4800G 48-Port (3CRS48G-48-91) 3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91) 3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)
4510G Switch Series Fix in progress use mitigations JF428A HP 4510-48G Switch JF847A HP 4510-24G Switch
3Com Switch 4510G 48 Port (3CRS45G-48-91) 3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91) 3Com Switch E4510-24G (3CRS45G-24-91)
4210G Switch Series Fix in progress use mitigations JF844A HP 4210-24G Switch JF845A HP 4210-48G Switch JF846A HP 4210-24G-PoE Switch
3Com Switch 4210-24G (3CRS42G-24-91) 3Com Switch 4210-48G (3CRS42G-48-91) 3Com Switch E4210-24G-PoE (3CRS42G-24P-91)
3610 Switch Series Fix in progress use mitigations JD335A HP 3610-48 Switch JD336A HP 3610-24-4G-SFP Switch JD337A HP 3610-24-2G-2G-SFP Switch JD338A HP 3610-24-SFP Switch H3C S3610-52P - model LS-3610-52P-OVS (0235A22C) H3C S3610-28P - model LS-3610-28P-OVS (0235A22D) H3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E) H3C S3610-28F - model LS-3610-28F-OVS (0235A22F)
3600 V2 Switch Series Fix in progress use mitigations JG299A HP 3600-24 v2 EI Switch JG300A HP 3600-48 v2 EI Switch JG301A HP 3600-24-PoE+ v2 EI Switch JG301B HP 3600-24-PoE+ v2 EI Switch JG302A HP 3600-48-PoE+ v2 EI Switch JG302B HP 3600-48-PoE+ v2 EI Switch JG303A HP 3600-24-SFP v2 EI Switch JG304A HP 3600-24 v2 SI Switch JG305A HP 3600-48 v2 SI Switch JG306A HP 3600-24-PoE+ v2 SI Switch JG306B HP 3600-24-PoE+ v2 SI Switch JG307A HP 3600-48-PoE+ v2 SI Switch JG307B HP 3600-48-PoE+ v2 SI Switch
3100V2 Fix in progress use mitigations JD313B HP 3100-24-PoE v2 EI Switch JD318B HP 3100-8 v2 EI Switch JD319B HP 3100-16 v2 EI Switch JD320B HP 3100-24 v2 EI Switch JG221A HP 3100-8 v2 SI Switch JG222A HP 3100-16 v2 SI Switch JG223A HP 3100-24 v2 SI Switch
3100V2-48 Fix in progress use mitigations JG315A HP 3100-48 v2 Switch
1910 Fix in progress use mitigations JE005A HP 1910-16G Switch JE006A HP 1910-24G Switch JE007A HP 1910-24G-PoE (365W) Switch JE008A HP 1910-24G-PoE(170W) Switch JE009A HP 1910-48G Switch JG348A HP 1910-8G Switch JG349A HP 1910-8G-PoE+ (65W) Switch JG350A HP 1910-8G-PoE+ (180W) Switch 3Com Baseline Plus Switch 2900 Gigabit Family - 52 port (3CRBSG5293) 3Com Baseline Plus Switch 2900G - 20 port (3CRBSG2093) 3Com Baseline Plus Switch 2900G - 28 port (3CRBSG2893) 3Com Baseline Plus Switch 2900G - 28HPWR (3CRBSG28HPWR93) 3Com Baseline Plus Switch 2900G - 28PWR (3CRBSG28PWR93)
1810v1 P2 Fix in progress use mitigations J9449A HP 1810-8G Switch J9450A HP 1810-24G Switch
1810v1 PK Fix in progress use mitigations J9660A HP 1810-48G Switch
MSR20 Fix in progress use mitigations JD432A HP A-MSR20-21 Multi-Service Router JD662A HP MSR20-20 Multi-Service Router JD663A HP MSR20-21 Multi-Service Router JD663B HP MSR20-21 Router JD664A HP MSR20-40 Multi-Service Router JF228A HP MSR20-40 Router JF283A HP MSR20-20 Router H3C RT-MSR2020-AC-OVS-H3C (0235A324) H3C RT-MSR2040-AC-OVS-H3 (0235A326) H3C MSR 20-20 (0235A19H) H3C MSR 20-21 (0235A325) H3C MSR 20-40 (0235A19K) H3C MSR-20-21 Router (0235A19J)
MSR20-1X Fix in progress use mitigations JD431A HP MSR20-10 Router JD667A HP MSR20-15 IW Multi-Service Router JD668A HP MSR20-13 Multi-Service Router JD669A HP MSR20-13 W Multi-Service Router JD670A HP MSR20-15 A Multi-Service Router JD671A HP MSR20-15 AW Multi-Service Router JD672A HP MSR20-15 I Multi-Service Router JD673A HP MSR20-11 Multi-Service Router JD674A HP MSR20-12 Multi-Service Router JD675A HP MSR20-12 W Multi-Service Router JD676A HP MSR20-12 T1 Multi-Service Router JF236A HP MSR20-15-I Router JF237A HP MSR20-15-A Router JF238A HP MSR20-15-I-W Router JF239A HP MSR20-11 Router JF240A HP MSR20-13 Router JF241A HP MSR20-12 Router JF806A HP MSR20-12-T Router JF807A HP MSR20-12-W Router JF808A HP MSR20-13-W Router JF809A HP MSR20-15-A-W Router JF817A HP MSR20-15 Router JG209A HP MSR20-12-T-W Router (NA) JG210A HP MSR20-13-W Router (NA) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8) H3C MSR 20-10 (0235A0A7) H3C RT-MSR2011-AC-OVS-H3 (0235A395) H3C RT-MSR2012-AC-OVS-H3 (0235A396) H3C RT-MSR2012-AC-OVS-W-H3 (0235A397) H3C RT-MSR2012-T-AC-OVS-H3 (0235A398) H3C RT-MSR2013-AC-OVS-H3 (0235A390) H3C RT-MSR2013-AC-OVS-W-H3 (0235A391) H3C RT-MSR2015-AC-OVS-A-H3 (0235A392) H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393) H3C RT-MSR2015-AC-OVS-I-H3 (0235A394) H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V) H3C MSR 20-11 (0235A31V) H3C MSR 20-12 (0235A32E) H3C MSR 20-12 T1 (0235A32B) H3C MSR 20-13 (0235A31W) H3C MSR 20-13 W (0235A31X) H3C MSR 20-15 A (0235A31Q) H3C MSR 20-15 A W (0235A31R) H3C MSR 20-15 I (0235A31N) H3C MSR 20-15 IW (0235A31P) H3C MSR20-12 W (0235A32G)
MSR30 Fix in progress use mitigations JD654A HP MSR30-60 POE Multi-Service Router JD657A HP MSR30-40 Multi-Service Router JD658A HP MSR30-60 Multi-Service Router JD660A HP MSR30-20 POE Multi-Service Router JD661A HP MSR30-40 POE Multi-Service Router JD666A HP MSR30-20 Multi-Service Router JF229A HP MSR30-40 Router JF230A HP MSR30-60 Router JF232A HP RT-MSR3040-AC-OVS-AS-H3 JF235A HP MSR30-20 DC Router JF284A HP MSR30-20 Router JF287A HP MSR30-40 DC Router JF801A HP MSR30-60 DC Router JF802A HP MSR30-20 PoE Router JF803A HP MSR30-40 PoE Router JF804A HP MSR30-60 PoE Router H3C MSR 30-20 Router (0235A328) H3C MSR 30-40 Router Host(DC) (0235A268) H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322) H3C RT-MSR3020-DC-OVS-H3 (0235A267) H3C RT-MSR3040-AC-OVS-H (0235A299) H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323) H3C RT-MSR3060-AC-OVS-H3 (0235A320) H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296) H3C RT-MSR3060-DC-OVS-H3 (0235A269) H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S) H3C MSR 30-20 (0235A19L) H3C MSR 30-20 POE (0235A239) H3C MSR 30-40 (0235A20J) H3C MSR 30-40 POE (0235A25R) H3C MSR 30-60 (0235A20K) H3C MSR 30-60 POE (0235A25S) H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)
MSR30-16 Fix in progress use mitigations JD659A HP MSR30-16 POE Multi-Service Router JD665A HP MSR30-16 Multi-Service Router JF233A HP MSR30-16 Router JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327) H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321) H3C MSR 30-16 (0235A237) H3C MSR 30-16 POE (0235A238)
MSR30-1X Fix in progress use mitigations JF800A HP MSR30-11 Router JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr JG182A HP MSR30-11E Router JG183A HP MSR30-11F Router JG184A HP MSR30-10 DC Router H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H) H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
MSR50 Fix in progress use mitigations JD433A HP MSR50-40 Router JD653A HP MSR50 Processor Module JD655A HP MSR50-40 Multi-Service Router JD656A HP MSR50-60 Multi-Service Router JF231A HP MSR50-60 Router JF285A HP MSR50-40 DC Router JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297) H3C MSR5040-DC-OVS-H3C (0235A20P) H3C RT-MSR5060-AC-OVS-H3 (0235A298) H3C MSR 50-40 Chassis (0235A20N) H3C MSR 50-60 Chassis (0235A20L)
MSR50-G2 Fix in progress use mitigations JD429A HP MSR50 G2 Processor Module JD429B HP MSR50 G2 Processor Module H3C H3C MSR 50 Processor Module-G2 (0231A84Q) H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD(0231A0KL)
MSR20 Russian version Fix in progress use mitigations JD663B HP MSR20-21 Router JF228A HP MSR20-40 Router JF283A HP MSR20-20 Router H3C RT-MSR2020-AC-OVS-H3C (0235A324) H3C RT-MSR2040-AC-OVS-H3 (0235A326)
MSR20-1X Russian version Fix in progress use mitigations JD431A HP MSR20-10 Router JF236A HP MSR20-15-I Router JF237A HP MSR20-15-A Router JF238A HP MSR20-15-I-W Router JF239A HP MSR20-11 Router JF240A HP MSR20-13 Router JF241A HP MSR20-12 Router JF806A HP MSR20-12-T Router JF807A HP MSR20-12-W Router JF808A HP MSR20-13-W Router JF809A HP MSR20-15-A-W Router JF817A HP MSR20-15 Router H3C MSR 20-10 (0235A0A7) H3C RT-MSR2015-AC-OVS-I-H3 (0235A394) H3C RT-MSR2015-AC-OVS-A-H3 (0235A392) H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393) H3C RT-MSR2011-AC-OVS-H3 (0235A395) H3C RT-MSR2013-AC-OVS-H3 (0235A390) H3C RT-MSR2012-AC-OVS-H3 (0235A396) H3C RT-MSR2012-T-AC-OVS-H3 (0235A398) H3C RT-MSR2012-AC-OVS-W-H3 (0235A397) H3C RT-MSR2013-AC-OVS-W-H3 (0235A391) H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)
MSR30 Russian version Fix in progress use mitigations JF229A HP MSR30-40 Router JF230A HP MSR30-60 Router JF235A HP MSR30-20 DC Router JF284A HP MSR30-20 Router JF287A HP MSR30-40 DC Router JF801A HP MSR30-60 DC Router JF802A HP MSR30-20 PoE Router JF803A HP MSR30-40 PoE Router JF804A HP MSR30-60 PoE Router H3C RT-MSR3040-AC-OVS-H (0235A299) H3C RT-MSR3060-AC-OVS-H3 (0235A320) H3C RT-MSR3020-DC-OVS-H3 (0235A267) H3C MSR 30-20 Router (0235A328) H3C MSR 30-40 Router Host(DC) (0235A268) H3C RT-MSR3060-DC-OVS-H3 (0235A269) H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322) H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323) H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
MSR30-1X Russian version Fix in progress use mitigations JF800A HP MSR30-11 Router JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr JG182A HP MSR30-11E Router JG183A HP MSR30-11F Router JG184A HP MSR30-10 DC Router H3C RT-MSR3011-AC-OVS-H3 (0235A29L) H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)
MSR30-16 Russian version Fix in progress use mitigations JF233A HP MSR30-16 Router JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327) H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
MSR50 Russian version Fix in progress use mitigations JD433A HP MSR50-40 Router JD653A HP MSR50 Processor Module JD655A HP MSR50-40 Multi-Service Router JD656A HP MSR50-60 Multi-Service Router JF231A HP MSR50-60 Router JF285A HP MSR50-40 DC Router JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297) H3C MSR 50 Processor Module (0231A791) H3C MSR 50-40 Chassis (0235A20N) H3C MSR 50-60 Chassis (0235A20L) H3C RT-MSR5060-AC-OVS-H3 (0235A298) H3C MSR5040-DC-OVS-H3C (0235A20P)
MSR50 G2 Russian version Fix in progress use mitigations JD429B HP MSR50 G2 Processor Module H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD (0231A0KL)
MSR9XX Fix in progress use mitigations JF812A HP MSR900 Router JF813A HP MSR920 Router JF814A HP MSR900-W Router JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr JG207A HP MSR900-W Router (NA) JG208A HP MSR920-W Router (NA) H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2) H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX) H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4) H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)
MSR9XX Russian version Fix in progress use mitigations JF812A HP MSR900 Router JF813A HP MSR920 Router JF814A HP MSR900-W Router JF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX) H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0) H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2) H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)
MSR93X Fix in progress use mitigations JG511A HP MSR930 Router JG512A HP MSR930 Wireless Router JG513A HP MSR930 3G Router JG514A HP MSR931 Router JG515A HP MSR931 3G Router JG516A HP MSR933 Router JG517A HP MSR933 3G Router JG518A HP MSR935 Router JG519A HP MSR935 Wireless Router JG520A HP MSR935 3G Router JG531A HP MSR931 Dual 3G Router JG596A HP MSR930 4G LTE/3G CDMA Router JG597A HP MSR936 Wireless Router JG665A HP MSR930 4G LTE/3G WCDMA Global Router JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
MSR93X Russian version Fix in progress use mitigations JG511A HP MSR930 Router JG512A HP MSR930 Wireless Router JG513A HP MSR930 3G Router JG514A HP MSR931 Router JG515A HP MSR931 3G Router JG516A HP MSR933 Router JG517A HP MSR933 3G Router JG518A HP MSR935 Router JG519A HP MSR935 Wireless Router JG520A HP MSR935 3G Router JG531A HP MSR931 Dual 3G Router JG596A HP MSR930 4G LTE/3G CDMA Router JG597A HP MSR936 Wireless Router JG665A HP MSR930 4G LTE/3G WCDMA Global Router JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
MSR1000 Fix in progress use mitigations JG732A HP MSR1003-8 AC Router
MSR2000 Fix in progress use mitigations JG411A HP MSR2003 AC Router
MSR3000 Fix in progress use mitigations JG404A HP MSR3064 Router JG405A HP MSR3044 Router JG406A HP MSR3024 AC Router JG409A HP MSR3012 AC Router JG861A HP MSR3024 TAA-compliant AC Router
MSR4000 Fix in progress use mitigations JG402A HP MSR4080 Router Chassis JG403A HP MSR4060 Router Chassis JG412A HP MSR4000 MPU-100 Main Processing Unit
F5000 Fix in progress use mitigations JG216A HP F5000 Firewall Standalone Chassis JD259A HP A5000-A5 VPN Firewall Chassis H3C SecPath F5000-A5 Host System (0150A0AG)
U200S and CS Fix in progress use mitigations JD268A HP 200-CS UTM Appliance JD273A HP U200-S UTM Appliance H3C SecPath U200-S (0235A36N)
U200A and M Fix in progress use mitigations JD274A HP 200-M UTM Appliance JD275A HP U200-A UTM Appliance H3C SecPath U200-A (0235A36Q)
F1000A and S Fix in progress use mitigations JD270A HP S1000-S VPN Firewall Appliance JD271A HP S1000-A VPN Firewall Appliance JG213A HP F1000-S-EI VPN Firewall Appliance JG214A HP F1000-A-EI VPN Firewall Appliance
SecBlade FW Fix in progress use mitigations JC635A HP 12500 VPN Firewall Module JD245A HP 9500 VPN Firewall Module JD249A HP 10500/7500 Advanced VPN Firewall Mod JD250A HP 6600 Firewall Processing Rtr Module JD251A HP 8800 Firewall Processing Module JD255A HP 5820 VPN Firewall Module H3C S9500E SecBlade VPN Firewall Module (0231A0AV) H3C S7500E SecBlade VPN Firewall Module (0231A832) H3C SR66 Gigabit Firewall Module (0231A88A) H3C SR88 Firewall Processing Module (0231A88L) H3C S5820 SecBlade VPN Firewall Module (0231A94J)
F1000E Fix in progress use mitigations JD272A HP S1000-E VPN Firewall Appliance
VSR1000 Fix in progress use mitigations JG810AAE HP VSR1001 Virtual Services Router JG811AAE HP VSR1001 Virtual Services Router JG812AAE HP VSR1004 Virtual Services Router JG813AAE HP VSR1008 Virtual Services Router
WX5002/5004 Fix in progress use mitigations JD441A HP 5800 ACM for 64-256 APs JD447B HP WX5002 Access Controller JD448A HP A-WX5004 Access Controller JD448B HP WX5004 Access Controller JD469A HP A-WX5004 (3Com) Access Controller JG261A HP 5800 Access Controller OAA TAA Mod
HP 850/870 Fix in progress use mitigations JG723A HP 870 Unified Wired-WLAN Appliance JG725A HP 870 Unifd Wrd-WLAN TAA Applnc
HP 830 Fix in progress use mitigations JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch JG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch JG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch JG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch
HP 6000 Fix in progress use mitigations JG639A HP 10500/7500 20G Unified Wired-WLAN Mod JG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod
M220 Fix in progress use mitigations J9798A HP M220 802.11n AM Access Point J9799A HP M220 802.11n WW Access Point
NGFW Fix in progress use mitigations JC882A HP S1050F NGFW Aplnc w/DVLabs 1-yr Lic JC883A HP S3010F NGFW Aplnc w/DVLabs 1-yr Lic JC884A HP S3020F NGFW Aplnc w/DVLabs 1-yr Lic JC885A HP S8005F NGFW Aplnc w/DVLabs 1-yr Lic JC886A HP S8010F NGFW Aplnc w/DVLabs 1-yr Lic
iMC UAM 7.0 Fix in progress use mitigations JD144A HP IMC UAM S/W Module w/200-User License JF388A HP IMC UAM S/W Module w/200-user License JD435A HP IMC EAD Client Software JF388AAE HP IMC UAM S/W Module w/200-user E-LTU JG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU
iMC EAD 7.0 Fix in progress use mitigations JF391AAE HP IMC EAD S/W Module w/200-user E-LTU JG754AAE HP IMC EAD SW Module w/ 50-user E-LTU JD147A HP IMC Endpoint Admission Defense Software Module with 200-user License JF391A HP IMC EAD S/W Module w/200-user License
iMC PLAT 7.0 Fix in progress use mitigations JF377AAE HP IMC Standard Edition Software Platform with 100-node E-LTU JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU JG747AAE HP IMC Standard Software Platform with 50-node E-LTU JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU JD125A HP IMC Standard Edition Software Platform with 100-node License JD815A HP IMC Standard Edition Software Platform with 100-node License JD816A HP A-IMC Standard Edition Software DVD Media JF377A HP IMC Standard Edition Software Platform with 100-node License JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU TJ635AAE HP IMC for ANM 50 node pack SW E-LTU (On HP Softwares CPL not HPNs) JF378AAE HP IMC Enterprise Edition Software Platform with 200-Node E-LTU JG748AAE HP IMC Enterprise Software Platform with 50-node E-LTU JD126A HP A-IMC Enterprise Software Platform with 200-node License JD808A HP A-IMC Enterprise Software Platform with 200-node License JD814A HP A-IMC Enterprise Edition Software DVD Media JF378A HP IMC Enterprise Edition Software Platform with 200-node License JG546AAE HP IMC Basic SW Platform w/50-node E-LTU JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU JG550AAE HP PMM to IMC Bsc WLM Upgr w/150 AP E-LTU JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU JG659AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU JG660AAE HP IMC Smart Connect w / WLAN Manager Virtual Appliance Edition E-LTU JG767AAE HP IMC Smart Connect with Wireless Service Manager Virtual Appliance Software E-LTU
HISTORY Version:1 (rev.1) - 20 June 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlOkrM4ACgkQ4B86/C0qfVn7/QCeK5T1H9dXfVQgIKSr5USqLmvq CtMAnjujH7e5aXfIOvxyyuB0FcSwIWCM =CEL7 -----END PGP SIGNATURE----- . OpenSSL is a 3rd party product that is embedded with some HP printer products. This bulletin notifies HP Printer customers about impacted products. To obtain the updated firmware, go to www.hp.com and follow these steps:
Select "Drivers & Software". Enter the appropriate product name listed in the table below into the search field. Click on "Search". Click on the appropriate product. Under "Select operating system" click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)" Note: If the "Cross operating system ..." link is not present, select applicable Windows operating system from the list. Select the appropriate firmware update under "Firmware".
Firmware Updates Table
Product Name Model Number Firmware Revision
HP Color LaserJet CM4540 MFP CC419A, CC420A, CC421A v 2302963_436067 (or higher)
HP Color LaserJet CP5525 CE707A,CE708A,CE709A v 2302963_436070 (or higher)
HP Color LaserJet Enterprise M750 D3L08A, D3L09A, D3L10A v 2302963_436077 (or higher)
HP Color LaserJet M651 CZ255A, CZ256A, CZ257A, CZ258A v 2302963_436073 (or higher)
HP Color LaserJet M680 CZ248A, CZ249A v 2302963_436072 (or higher)
HP Color LaserJet Flow M680 CZ250A, CA251A v 2302963_436072 (or higher)
HP LaserJet Enterprise 500 color MFP M575dn CD644A, CD645A v 2302963_436081 (or higher)
HP LaserJet Enterprise 500 MFP M525f CF116A, CF117A v 2302963_436069 (or higher)
HP LaserJet Enterprise 600 M601 Series CE989A, CE990A v 2302963_436082 (or higher)
HP LaserJet Enterprise 600 M602 Series CE991A, CE992A, CE993A v 2302963_436082 (or higher)
HP LaserJet Enterprise 600 M603 Series CE994A, CE995A, CE996A v 2302963_436082 (or higher)
HP LaserJet Enterprise MFP M630 series B3G84A, B3G85A, B3G86A, J7X28A v 2303714_233000041 (or higher)
HP LaserJet Enterprise 700 color M775 series CC522A, CC523A, CC524A, CF304A v 2302963_436079 (or higher)
HP LaserJet Enterprise 700 M712 series CF235A, CF236A, CF238A v 2302963_436080 (or higher)
HP LaserJet Enterprise 800 color M855 A2W77A, A2W78A, A2W79A v 2302963_436076 (or higher)
HP LaserJet Enterprise 800 color MFP M880 A2W76A, A2W75A, D7P70A, D7P71A v 2302963_436068 (or higher)
HP LaserJet Enterprise Color 500 M551 Series CF081A,CF082A,CF083A v 2302963_436083 (or higher)
HP LaserJet Enterprise color flow MFP M575c CD646A v 2302963_436081 (or higher)
HP LaserJet Enterprise flow M830z MFP CF367A v 2302963_436071 (or higher)
HP LaserJet Enterprise flow MFP M525c CF118A v 2302963_436069 (or higher)
HP LaserJet Enterprise M4555 MFP CE502A,CE503A, CE504A, CE738A v 2302963_436064 (or higher)
HP LaserJet Enterprise M806 CZ244A, CZ245A v 2302963_436075 (or higher)
HP LaserJet Enterprise MFP M725 CF066A, CF067A, CF068A, CF069A v 2302963_436078 (or higher)
HP Scanjet Enterprise 8500 Document Capture Workstation L2717A, L2719A v 2302963_436065 (or higher)
OfficeJet Enterprise Color MFP X585 B5L04A, B5L05A,B5L07A v 2302963_436066 (or higher)
OfficeJet Enterprise Color X555 C2S11A, C2S12A v 2302963_436074 (or higher)
HP Color LaserJet CP3525 CC468A, CC469A, CC470A, CC471A v 06.183.1 (or higher)
HP LaserJet M4345 Multifunction Printer CB425A, CB426A, CB427A, CB428A v 48.306.1 (or higher)
HP LaserJet M5025 Multifunction Printer Q7840A v 48.306.1 (or higher)
HP Color LaserJet CM6040 Multifunction Printer Q3938A, Q3939A v 52.256.1 (or higher)
HP Color LaserJet Enterprise CP4525 CC493A, CC494A, CC495A v 07.164.1 (or higher)
HP Color LaserJet Enterprise CP4025 CC489A, CC490A v 07.164.1 (or higher)
HP LaserJet M5035 Multifunction Printer Q7829A, Q7830A, Q7831A v 48.306.1 (or higher)
HP LaserJet M9050 Multifunction Printer CC395A v 51.256.1 (or higher)
HP LaserJet M9040 Multifunction Printer CC394A v 51.256.1 (or higher)
HP Color LaserJet CM4730 Multifunction Printer CB480A, CB481A, CB482A, CB483A v 50.286.1 (or higher)
HP LaserJet M3035 Multifunction Printer CB414A, CB415A, CC476A, CC477A v 48.306.1 (or higher)
HP 9250c Digital Sender CB472A v 48.293.1 (or higher)
HP LaserJet Enterprise P3015 CE525A,CE526A,CE527A,CE528A,CE595A v 07.186.1 (or higher)
HP LaserJet M3027 Multifunction Printer CB416A, CC479A v 48.306.1 (or higher)
HP LaserJet CM3530 Multifunction Printer CC519A, CC520A v 53.236.1 (or higher)
HP Color LaserJet CP6015 Q3931A, Q3932A, Q3933A, Q3934A, Q3935A v 04.203.1 (or higher)
HP LaserJet P4515 CB514A,CB515A, CB516A, CB517A v 04.213.1 (or higher)
HP Color LaserJet CM6030 Multifunction Printer CE664A, CE665A v 52.256.1 (or higher)
HP LaserJet P4015 CB509A, CB526A, CB511A, CB510A v 04.213.1 (or higher)
HP LaserJet P4014 CB507A, CB506A, CB512A v 04.213.1 (or higher)
HISTORY Version:1 (rev.1) - 22 September 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0445", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "nec", "version": null }, { "model": "jboss enterprise application platform", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "6.2.3" }, { "model": "jboss enterprise web server", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "2.0.1" }, { "model": "jboss enterprise web platform", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "5.2.0" }, { "model": "power", "scope": "eq", "trust": 1.2, "vendor": "ibm", "version": "7200" }, { "model": "powerlinux 7r2", "scope": "eq", "trust": 1.2, "vendor": "ibm", "version": "0" }, { "model": "openssl", "scope": "lt", "trust": 1.0, "vendor": "openssl", "version": "0.9.8za" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.2" }, { "model": "openssl", "scope": "lt", "trust": 1.0, "vendor": "openssl", "version": "1.0.0m" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "19" }, { "model": "application processing engine", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.0.2" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "0.10.29" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.1" }, { "model": "storage", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.1" }, { "model": "cp1543-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1.25" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "20" }, { "model": "rox", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.16.1" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "2.7.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.4.0" }, { "model": "openssl", "scope": "gte", "trust": 1.0, "vendor": "openssl", "version": "1.0.0" }, { "model": "openssl", "scope": "gte", "trust": 1.0, "vendor": "openssl", "version": "1.0.1" }, { "model": "s7-1500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.6" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "2.7.8" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.4.2" }, { "model": "mariadb", "scope": "gte", "trust": 1.0, "vendor": "mariadb", "version": "10.0.0" }, { "model": "server", "scope": "lt", "trust": 1.0, "vendor": "filezilla", "version": "0.9.45" }, { "model": "openssl", "scope": "lt", "trust": 1.0, "vendor": "openssl", "version": "1.0.1h" }, { "model": "mariadb", "scope": "lt", "trust": 1.0, "vendor": "mariadb", "version": "10.0.13" }, { "model": "jboss enterprise application platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.2.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4" }, { "model": "power", "scope": "eq", "trust": 0.9, "vendor": "ibm", "version": "7100" }, { "model": "power", "scope": "eq", "trust": 0.9, "vendor": "ibm", "version": "7400" }, { "model": "powerlinux 7r1", "scope": "eq", "trust": 0.9, "vendor": "ibm", "version": "0" }, { "model": "bladecenter advanced management module 3.66e", "scope": null, "trust": 0.9, "vendor": "ibm", "version": null }, { "model": "junos 12.1x44-d20", "scope": null, "trust": 0.9, "vendor": "juniper", "version": null }, { "model": "power express", "scope": "eq", "trust": 0.9, "vendor": "ibm", "version": "5200" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "attachmate", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "global associates", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nvidia", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openssl", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "10.4" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "11.4" }, { "model": "junos 11.4r9", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "13.3" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "12.3" }, { "model": "power", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "7700" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "10.1" }, { "model": "one-x mobile sip for ios", "scope": "eq", "trust": 0.6, "vendor": "avaya", "version": "6.2.2" }, { "model": "one-x mobile sip for ios", "scope": "eq", "trust": 0.6, "vendor": "avaya", "version": "6.2.5" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "10.0" }, { "model": "power", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "5700" }, { "model": "power", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "7800" }, { "model": "power", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "7300" }, { "model": "power", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "7500" }, { "model": "junos 10.4s15", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "12.1x45" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "12.1" }, { "model": "junos 13.2r2", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos 10.4r15", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "11.1" }, { "model": "one-x mobile sip for ios", "scope": "eq", "trust": 0.6, "vendor": "avaya", "version": "6.2" }, { "model": "one-x mobile sip for ios", "scope": "eq", "trust": 0.6, "vendor": "avaya", "version": "6.2.3" }, { "model": "junos 13.3r1", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos 10.4s", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "one-x mobile sip for ios", "scope": "eq", "trust": 0.6, "vendor": "avaya", "version": "6.2.4" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "12.2" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "11.2" }, { "model": "one-x mobile sip for ios", "scope": "eq", "trust": 0.6, "vendor": "avaya", "version": "6.2.1" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "10.2" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "11.4x27" }, { "model": "junos 11.4r8", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos 10.4r16", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d10", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "13.1" }, { "model": "junos 12.1r7", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.6, "vendor": "juniper", "version": "10.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.110.6" }, { "model": "storevirtual 1tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "power ps702", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "cloudplatform", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.30" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3.3" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.0.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.117" }, { "model": "junos d30", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.112" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.46" }, { "model": "chrome for android", "scope": "ne", "trust": 0.3, "vendor": "google", "version": "35.0.1916.141" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "fortigate", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.6" }, { "model": "integration bus", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.0" }, { "model": "tandberg mxp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8800" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.18" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.9.1" }, { "model": "oncommand performance manager", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5600v210.1" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.10" }, { "model": "idataplex dx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79120" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.155" }, { "model": "laserjet pro color printer m251n/nw cf147a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "20020140919" }, { "model": "horizon view feature pack", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.3" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.5" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.0" }, { "model": "arubaos", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.4" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.6.1" }, { "model": "cp1543-1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "computer telephony integration object server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 12.1r", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.2.2" }, { "model": "vsphere virtual disk development kit", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "fortimanager", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.0.7" }, { "model": "laserjet p2055 printer series ce460a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "20141201" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.35" }, { "model": "ace application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "datafort e-series", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571471.43" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3100v2-480" }, { "model": "i v5r3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "junos 11.4r11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "proventia network security controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.470" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.5.4" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.6.10" }, { "model": "junos 12.1x46-d25", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "project openssl 1.0.0g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos space ja1500 appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.1.3" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571431.43" }, { "model": "clustered data ontap antivirus connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3" }, { "model": "laserjet printer series q7543a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52008.241" }, { "model": "proxyav", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.5" }, { "model": "laserjet enterprise flow mfp m525c cf118a 2302963 436069", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.20" }, { "model": "fortios b0537", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.8" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.06" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.0" }, { "model": "laserjet enterprise m806 cz244a 2302963 436075", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.1.3" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "9.1-release-p15", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "laserjet enterprise color m775 series cf304a 2302963 436079", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "700" }, { "model": "fortirecorder", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "1.4.2" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.00" }, { "model": "openvpn", "scope": "eq", "trust": 0.3, "vendor": "openvpn", "version": "2.3.3" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.2.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.11" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.32" }, { "model": "laserjet enterprise mfp m525f cf117a 2302963 436069", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "500" }, { "model": "laserjet enterprise color m775 series cc522a 2302963 436079", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "700" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.15" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.7" }, { "model": "secure analytics 2013.2r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storevirtual 450gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.6" }, { "model": "vpn client v100r001c02spc702", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "laserjet enterprise color mfp m880 d7p70a 2302963 436068", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "800" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.6" }, { "model": "laserjet pro color mfp m276n/nw cf145a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "20020140919" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.1.100.3" }, { "model": "api management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "laserjet m9050 multifunction printer cc395a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.2" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x310025820" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "34.0" }, { "model": "junos 13.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "integrity superdome and hp converged system for sap hana", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x9005.50.12" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.20" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.3" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.8" }, { "model": "service delivery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.1" }, { "model": "sdn for virtual environments", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.0.2" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.2" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.3.5" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.5.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.1.2" }, { "model": "manageone v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.1" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7400" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.38" }, { "model": "tivoli workload scheduler distributed ga level", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2.0" }, { "model": "snapprotect", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "junos r8-s2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.34" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "color laserjet enterprise cp4525 cc495a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "10.0-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.49" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.342" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "oneview", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.10" }, { "model": "laserjet enterprise mfp m725 cf069a 2302963 436078", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.53" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "7.0.1" }, { "model": "storevirtual vsa software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "12.6" }, { "model": "prime access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.48" }, { "model": "nvp", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.2.2" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.1" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.7" }, { "model": "database and middleware automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "tivoli netcool/system service monitor fp11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "storevirtual 600gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.0" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "tekelec hlr router", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "open systems snapvault agent", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "agile controller v100r001c00spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "web security gateway anywhere", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.7" }, { "model": "laserjet p4515 cb515a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.203.1" }, { "model": "laserjet pro mfp m425dn/dw cf286a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "40020140919" }, { "model": "laserjet enterprise m712 series cf236a 2302963 436080", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "700" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.49" }, { "model": "project openssl 1.0.0h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "mds switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smart update manager for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.3.5" }, { "model": "idol speech software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "client applications", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1" }, { "model": "network connect", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.5.0.16091" }, { "model": "laserjet enterprise color m551 series cf082a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5000" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.8" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.124" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.10" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "telepresence tx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.5.2" }, { "model": "ftp server", "scope": "eq", "trust": 0.3, "vendor": "cerberus", "version": "7.0.0.2" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.2.2" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.32" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.14" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.211" }, { "model": "laserjet enterprise mfp m725 cf066a 2302963 436078", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.40" }, { "model": "websphere mq", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.10" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.0" }, { "model": "wx5002/5004 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "netscaler 9.3.e", "scope": null, "trust": 0.3, "vendor": "citrix", "version": null }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.71" }, { "model": "laserjet m9040 multifunction printer cc394a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "51.256.1" }, { "model": "updatexpress system packs installer", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.61" }, { "model": "usg5000 v300r001c10sph201", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.46" }, { "model": "snapdrive for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.3" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "junos space 13.3r1.8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "proxyav", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.4" }, { "model": "project openssl 0.9.8y", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "enterprise communications broker pcz2.0.0m4p5", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "sparc enterprise m4000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1118" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1" }, { "model": "aura application server sip core pb23", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "vsr1000 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.33" }, { "model": "asg2000 v100r001c10sph001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.130.14" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.10" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.14" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.16" }, { "model": "junos r4-s2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.128.3" }, { "model": "virtuozzo containers for linux", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "4.6" }, { "model": "laserjet p4015 cb526a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "client applications", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "laserjet enterprise mfp m630 series j7x28a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "laserjet p3005 printer series q7813a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.190.3" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.0.0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.4" }, { "model": "vsphere virtual disk development kit", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "infosphere master data management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.24" }, { "model": "vsm v200r002c00spc503", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.37" }, { "model": "10.0-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "710/7300" }, { "model": "vdi-in-a-box", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "5.3.8" }, { "model": "fortiauthenticator", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.08" }, { "model": "airwave", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "7.4" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "3.1.4" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "0" }, { "model": "nextscale nx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "54550" }, { "model": "storevirtual fc 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.5" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.52" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.110" }, { "model": "network connect 8.0r3.1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system chassis management module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "tandberg codian isdn gw", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "32200" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.95" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.8" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise manager ops center", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.4" }, { "model": "security access manager for web appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "s5900 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "watson explorer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0" }, { "model": "p2000 g3 msa array system ts251p006", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "documentum content server p05", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "7.1" }, { "model": "laserjet printer series q5404a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "42508.250.2" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.0.5" }, { "model": "jabber video for telepresence", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.1.2" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.5" }, { "model": "flex system p270", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7954-24x)0" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.04" }, { "model": "storevirtual 600gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.10" }, { "model": "laserjet p4015 cb509a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "storevirtual fc 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.1.2" }, { "model": "tivoli workload scheduler distributed fp05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "tivoli workload scheduler distributed fp01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0" }, { "model": "data ontap smi-s agent", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "endeca information discovery studio", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.1" }, { "model": "snapdrive for windows", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.18" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "10.0-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.3" }, { "model": "infosphere master data management provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "storevirtual 600gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453011.5" }, { "model": "one-x communicator for mac os", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "x1.0.5" }, { "model": "laserjet m5035 multifunction printer q7829a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.38" }, { "model": "telepresence server on multiparty media", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3200" }, { "model": "s2750\u0026s5700\u0026s6700 v100r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "8.0-release", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.5.2.3" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "1.6.1" }, { "model": "storevirtual 3tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.0" }, { "model": "laserjet enterprise m602 series ce992a 2302963 436082", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "fortiwifi", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.0.8" }, { "model": "laserjet enterprise m712 series cf238a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7000" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-453" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.4" }, { "model": "junos 12.1r8-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx5208-v2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "blackberry enterprise service", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.1.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.344" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x375087220" }, { "model": "9.2-release-p7", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "content analysis system software", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.5.5" }, { "model": "fortimail", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.5" }, { "model": "junos 12.1x46-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "sparc enterprise m9000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.14" }, { "model": "advanced settings utility", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.60" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.0" }, { "model": "websphere datapower xml accelerator xa35", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0.7" }, { "model": "(comware family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "12500v7)0" }, { "model": "automation stratix", "scope": "ne", "trust": 0.3, "vendor": "rockwell", "version": "590015.6.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.11" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.50" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v5000-" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.72" }, { "model": "nexus series fabric extenders", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "intelligencecenter", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.2" }, { "model": "project openssl 1.0.1f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "strm 2012.1r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storevirtual 600gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "413012.0" }, { "model": "financial services lending and leasing", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3.2" }, { "model": "fortimail build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "4.3.8546" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.55" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.5" }, { "model": "documentum content server p02", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "7.1" }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.0.3" }, { "model": "sbr global enterprise", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "color laserjet printer series q7533a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "300046.80.2" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.10" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.19" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "power ps700", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "bcaaa", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.5" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.1.7" }, { "model": "communicator for android", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "laserjet enterprise m712 series cf235a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7000" }, { "model": "color laserjet cp5525 ce708a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.12" }, { "model": "desktop collaboration experience dx650", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aura application server sip core pb28", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "oncommand workflow automation", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "automation stratix", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "59000" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "storevirtual hybrid storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433511.5" }, { "model": "communicator for android", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0.2" }, { "model": "client applications", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.48" }, { "model": "telepresence system series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.5.2" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.41" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.63" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.9" }, { "model": "secure analytics 2014.2r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "color laserjet cm4540 mfp cc421a 2302963 436067", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tivoli workload scheduler for applications fp02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "clustered data ontap antivirus connector", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "storevirtual hybrid san solution", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.5" }, { "model": "color laserjet cp6015 q3934a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.203.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.5" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.1.21" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.6" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "storevirtual vsa software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "12.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.24" }, { "model": "telepresence ip gateway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ape", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2.0" }, { "model": "junos 12.1r10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "p2000 g3 msa array system ts251p005", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "idol software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.8" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.1" }, { "model": "smart update manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3.0" }, { "model": "open systems snapvault 3.0.1p6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "key", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.2" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.5" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.14" }, { "model": "laserjet p4515 cb515a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "worklight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "tivoli netcool/system service monitor fp13", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "laserjet enterprise color m775 series cc523a 2302963 436079", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "700" }, { "model": "9.3-beta1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.01" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.11" }, { "model": "idp", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.1" }, { "model": "power 780", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "watson explorer security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "52056340" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.53" }, { "model": "tandberg mxp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7700" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "9.4" }, { "model": "junos 12.2r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.7" }, { "model": "u200s and cs family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "client applications", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "security threat response manager 2013.2r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.71" }, { "model": "pulse desktop 5.0r4.1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "cloudburst", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "413012.0" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.3.2" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.3.7" }, { "model": "epolicy orchestrator", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.6.1" }, { "model": "winscp", "scope": "ne", "trust": 0.3, "vendor": "winscp", "version": "5.5.4" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.04" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.3" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "enterprise session border controller ecz7.3m2p2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "integrated management module ii", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.02" }, { "model": "epolicy orchestrator", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.6.6" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "laserjet m3035 multifunction printer cc476a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "hsr6800 russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.1" }, { "model": "management center", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.3" }, { "model": "color laserjet m651 cz258a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "switch series (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10500v5)0" }, { "model": "ddos secure", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "5.14.1-1" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "3.4.1" }, { "model": "9.3-beta1-p2", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "video surveillance series ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60000" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.2" }, { "model": "vsm v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "junos 12.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "message networking sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "officejet enterprise color mfp b5l05a 2302963 436066", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x585" }, { "model": "color laserjet cm4540 mfp cc420a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "dgs-1210-52", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "4.00.025" }, { "model": "ngfw family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "powervu d9190 comditional access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "storevirtual 3tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453011.5" }, { "model": "integrated management module ii", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.31" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.57" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.3" }, { "model": "msr9xx russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "i v5r3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "junos 12.3r4-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.14" }, { "model": "ssl vpn", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "8.0" }, { "model": "10.0-release-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.9.3" }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1.1" }, { "model": "ive os 7.4r11.1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "flex system p260", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7895-23x)0" }, { "model": "laserjet enterprise m806 cz244a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "usage meter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.3" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "6.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.73" }, { "model": "security network intrusion prevention system gx5008", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "storevirtual china hybrid storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.5" }, { "model": "softco v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "proxyav", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "3.4.2.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.3" }, { "model": "s2700\u0026s3700 v100r006c05+v100r06h", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.56" }, { "model": "horizon mirage edge gateway", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.4.2" }, { "model": "oceanstor s6800t v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "storevirtual 4tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.6" }, { "model": "virtuozzo containers for windows", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "4.6" }, { "model": "storevirtual 900gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "junos 12.1x44-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "color laserjet cm4730 multifunction printer cb480a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.54" }, { "model": "sbr enterprise", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "laserjet enterprise p3015 ce527a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "telepresence mcu series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.9.3" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.8" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.014" }, { "model": "asg2000 v100r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.154" }, { "model": "idp 5.1r4", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx4004", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gv1000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "nac manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "splunk", "scope": "ne", "trust": 0.3, "vendor": "splunk", "version": "6.0.4" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "smc2.0 v100r002c01b017sp17", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "463012.6" }, { "model": "laserjet cm3530 multifunction printer cc519a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "53.236.1" }, { "model": "laserjet pro color mfp m276n/nw cf144a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "20020140919" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "58000" }, { "model": "color laserjet cm4730 multifunction printer cb481a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "email appliance", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.7.0.0" }, { "model": "email security gateway", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.3" }, { "model": "junos os 12.1x46-d20", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.0.2" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.10" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.43" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.13" }, { "model": "junos 12.2r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "one-x communicator for mac os", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "x1.0.4" }, { "model": "network connect 7.4r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "msa storage gl200r007", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1040" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.1.4" }, { "model": "tivoli workload scheduler distributed", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.10" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "89450" }, { "model": "rox", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "11.16.1" }, { "model": "icewall sso dfw", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "usg2000 v300r001c10sph201", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "laserjet p4014 cb506a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.0" }, { "model": "arubaos", "scope": "ne", "trust": 0.3, "vendor": "arubanetworks", "version": "6.3.1.8" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.0" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.6" }, { "model": "system x3500m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73801.42" }, { "model": "licensing", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "ive os", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "8.0" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x325025830" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.53" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.9" }, { "model": "fortimail", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.1.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3" }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.5" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "storevirtual 600gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.5" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "2.1.5" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "service delivery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.2" }, { "model": "enterprise content management system monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "storevirtual 900gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "switch series (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10500v7)0" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.6" }, { "model": "idol image server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "10.7" }, { "model": "ecns600 v100r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace u19** v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "project openssl 1.0.0c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sbr carrier", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.5" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "spa112 2-port phone adapter", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloudplatform", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.2.1-x" }, { "model": "watson explorer security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "laserjet enterprise color m551 series cf081a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5000" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.0" }, { "model": "universal small cell series software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70003.4.20" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.2" }, { "model": "oceanstor s5600t v100r005c30spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "9.0--releng", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "laserjet enterprise color m855 a2w78a 2302963 436076", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "800" }, { "model": "one-x communicator for mac os", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "x1.0.2" }, { "model": "color laserjet printer series q5984a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "380046.80.8" }, { "model": "simatic cp1543-1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1.1" }, { "model": "power express f/c", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "52056330" }, { "model": "color laserjet cp5525 ce707a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "9.0-releng", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "system dx360m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73231.42" }, { "model": "storevirtual china hybrid san solution", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.5" }, { "model": "psb email and server security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "10.00" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3-66.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.23" }, { "model": "laserjet p4014 cb507a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "bladecenter js43 with feature code", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7778-23x8446)0" }, { "model": "toolscenter suite", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.53" }, { "model": "unified communications series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.18" }, { "model": "junos space 11.4r5.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "system storage ts2900 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0026" }, { "model": "junos 12.1r7-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "8.4-release-p12", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "netcool/system service monitor fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.014" }, { "model": "exalogic", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x2-22.0.6.2.0" }, { "model": "color laserjet m680 cz248a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "bbm for android", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.46" }, { "model": "fortianalyzer", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.5" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.6.0" }, { "model": "color laserjet enterprise cp4025 cc489a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.164.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "tivoli management framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "laserjet m3027 multifunction printer cb416a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security information and event management hf11", "scope": "ne", "trust": 0.3, "vendor": "mcafee", "version": "9.3.2" }, { "model": "laserjet pro mfp m425dn/dw cf288a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "40020140919" }, { "model": "snapdrive for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "junos 12.1r5-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.12" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x363071580" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.8" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.29" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.30" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.2.1" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.1.1" }, { "model": "content analysis system", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "vsphere storage appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "aura experience portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "elan", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "8.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.15" }, { "model": "tivoli storage productivity center fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2" }, { "model": "storevirtual 450gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.0" }, { "model": "laserjet m5035 multifunction printer q7831a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "2.2" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "msr2000 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "email security gateway", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "storevirtual 3tb mdl sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.0" }, { "model": "aura presence services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "color laserjet printer series cb433a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "470046.230.6" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.3" }, { "model": "laserjet enterprise m712 series cf236a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7000" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "3.1.12" }, { "model": "tivoli netcool/system service monitor fp9", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "communicator for ipad", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0.1" }, { "model": "color laserjet printer series q7535a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "300046.80.2" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "8.1.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.7" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "storevirtual 450gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "svn2200 v200r001c01hp0001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storevirtual fc 900gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "bladecenter js12 express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7998-60x)0" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.12" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "laserjet multifunction printer series q3943a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43459.310.2" }, { "model": "usg9500 v300r001c01spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "laserjet p4015 cb526a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.7" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "cms r16 r6", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "system x3200m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73271.42" }, { "model": "client applications", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.115" }, { "model": "cit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.52" }, { "model": "storevirtual 1tb mdl sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "flashsystem 9840-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "management center", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.3.2.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.12" }, { "model": "storevirtual 450gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.0" }, { "model": "color laserjet cp3505 printer series ce491a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.160.2" }, { "model": "laserjet m5035 multifunction printer q7830a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "network connect", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.4.0.15779" }, { "model": "color laserjet cp3525 cc468a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.183.1" }, { "model": "open systems snapvault", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.6" }, { "model": "8.4-release-p4", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "aura application server sip core pb5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "view client", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "host agent for oncommand core package", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "mcp russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "66000" }, { "model": "storevirtual 1tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "network connect", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.0.0.12141" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.159" }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.6" }, { "model": "ecns610 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.24" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.93" }, { "model": "color laserjet printer series q7495a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "470046.230.6" }, { "model": "a6600 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.817" }, { "model": "laserjet enterprise m602 series ce991a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6000" }, { "model": "f5000 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet cm6030 multifunction printer ce664a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52.256.1" }, { "model": "9.2-release-p8", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.1" }, { "model": "color laserjet enterprise cp4025 cc489a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "network connect 7.4r9.1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vcsa", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "idataplex dx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79130" }, { "model": "protection service for email", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.5" }, { "model": "color laserjet cp3525 cc471a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.183.1" }, { "model": "laserjet enterprise flow mfp m525c cf118a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "junos r11", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1" }, { "model": "proventia network security controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.913" }, { "model": "laserjet enterprise color flow mfp m575c cd646a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet m3035 multifunction printer cb415a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "junos 10.4s13", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "7.3" }, { "model": "laserjet cm3530 multifunction printer cc520a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.7" }, { "model": "sdn for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0" }, { "model": "oceanstor s5600t v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.2" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x47" }, { "model": "espace iad v300r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storevirtual fc 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.44" }, { "model": "color laserjet cp5525 ce708a 2302963 436070", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cognos express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "pk family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1810v10" }, { "model": "color laserjet cp6015 q3935a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "3par service processor sp-4.2.0.ga-29.p002", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "3.1.10" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "telepresence server on virtual machine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "laserjet enterprise m602 series ce993a 2302963 436082", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.126" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "2.1.5-2" }, { "model": "laserjet m4345 multifunction printer cb427a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "open systems snapvault", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.6.1" }, { "model": "laserjet p4515 cb517a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.9" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "color laserjet cp5525 ce709a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet m5025 multifunction printer q7840a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.12" }, { "model": "oceanstor s5800t v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "security network intrusion prevention system gx4002", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "oceanstor s5800t v100r005c30spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "color laserjet cp6015 q3933a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "bladesystem c-class virtual connect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.20" }, { "model": "color laserjet flow m680 cz250a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "junos 11.4r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vdi communicator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0.2" }, { "model": "color laserjet cp3505 printer series cb444a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.160.2" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.5.3" }, { "model": "icewall sso dfw r3", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.10" }, { "model": "web security gateway", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.7" }, { "model": "color laserjet printer series cb432a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "470046.230.6" }, { "model": "cognos express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "horizon view client", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.3.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.7.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0.00" }, { "model": "color laserjet multifunction printer series q7519a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "400046.380.3" }, { "model": "telepresence tx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90006.1.20" }, { "model": "flashsystem 9848-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "2.1.2" }, { "model": "malware analysis appliance", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "4.2.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.31" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.2" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.2" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.00" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.5.6.2" }, { "model": "junos os 12.1x47-d15", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.25" }, { "model": "junos 13.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vfabric application director", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "storevirtual 3tb mdl sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453011.5" }, { "model": "tandberg mxp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9900" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.10" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.2" }, { "model": "cloud service automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.00" }, { "model": "d9036 modular encoding platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cluster network/management switches", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "vma san gateway g5.5.1", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "flex system p260 compute node /fc efd9", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "10.0-rc1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "blackberry os", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.0.92743" }, { "model": "system storage ts2900 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0025" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8300" }, { "model": "color laserjet cm6040 multifunction printer q3938a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.0" }, { "model": "storevirtual 450gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453011.5" }, { "model": "chargeback manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.6" }, { "model": "fortianalyzer", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.2" }, { "model": "color laserjet m651 cz258a 2302963 436073", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5950" }, { "model": "tivoli netcool/system service monitor fp7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.3.4" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "flex system p260", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7895-22x)0" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "tssc", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.3.15" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.7" }, { "model": "secblade fw family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.5.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.42" }, { "model": "icewall mcrp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "snapdrive for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "guardium database activity monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "bbm for iphone", "scope": "ne", "trust": 0.3, "vendor": "rim", "version": "2.2.1.24" }, { "model": "vsphere sdk for perl", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "laserjet enterprise color mfp m880 a2w76a 2302963 436068", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "800" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0.1650.59" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.1" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "project openssl 0.9.8s", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "telepresence serial gateway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "uacos c4.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "1.6" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "elog v100r003c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.2" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.0" }, { "model": "ata series analog telephone adaptor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1900" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.7" }, { "model": "flare experience for ipad", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.2.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.125" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.0.9.8" }, { "model": "laserjet enterprise p3015 ce528a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.186.1" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1.3" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "89610" }, { "model": "idol speech software", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "10.7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "storevirtual fc 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "color laserjet enterprise cp4525 cc494a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.7" }, { "model": "vcenter operations manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.8.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.0" }, { "model": "storevirtual hybrid storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.9.5" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.30" }, { "model": "storevirtual 450gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.51" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364160" }, { "model": "fortianalyzer", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.4" }, { "model": "prime lan management solution", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "msr50 g2 russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70006.4" }, { "model": "big-ip edge clients for linux", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7080" }, { "model": "dgs-1500-52", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "2.51.005" }, { "model": "junos 11.4r6-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "laserjet m9040 multifunction printer cc394a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cms r17ac.h", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "8.1" }, { "model": "color laserjet cp3525 cc470a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "storevirtual 1tb mdl china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.122" }, { "model": "laserjet pro color printer m251n/nw cf146a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "20020140919" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1" }, { "model": "laserjet printer series q5401a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "42508.250.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.47" }, { "model": "blackberry os", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.0.10" }, { "model": "ucs central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "power ps703 blade", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7891-73x)0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "3.3.1" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.36" }, { "model": "system storage ts3400 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0039" }, { "model": "dynamic system analysis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.60" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.6" }, { "model": "s7700\u0026s9700 v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "flex system p460 compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7895-43x)0" }, { "model": "update manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "1.0.6" }, { "model": "sterling connect:direct for microsoft windows", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.7" }, { "model": "openvpn", "scope": "ne", "trust": 0.3, "vendor": "openvpn", "version": "2.3.4" }, { "model": "junos 12.1x44-d32", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "splunk", "scope": "ne", "trust": 0.3, "vendor": "splunk", "version": "6.1.2" }, { "model": "freedome for android", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "0" }, { "model": "fortios b0630", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.8" }, { "model": "proventia network security controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1768" }, { "model": "nac guest server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.00" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.60" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.4" }, { "model": "dsr-1000n 1.09.b61", "scope": "ne", "trust": 0.3, "vendor": "d link", "version": null }, { "model": "unity connection", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "project metasploit framework", "scope": "eq", "trust": 0.3, "vendor": "metasploit", "version": "4.1.0" }, { "model": "oncommand unified manager host package", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "idp", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.1" }, { "model": "oceanstor s2200t v100r005c30spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "web security", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.7" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "icewall sso dfw r1", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.4.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.10" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.14" }, { "model": "security enterprise scanner", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "spa232d multi-line dect ata", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "policy center v100r003c00spc305", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.1" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5600v19.7" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.11" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "flex system p270 compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7954-24x)0" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "58200" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.52" }, { "model": "laserjet pro m401a/d/dn/dnw/dw/n cf285a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "40020150212" }, { "model": "crossbow", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "system x3650m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79471.42" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.3.0" }, { "model": "system x3200m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73281.42" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.16" }, { "model": "ios software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "i v5r4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.39" }, { "model": "ios xe software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "color laserjet cm6040 multifunction printer q3939a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "tandberg codian isdn gw", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "32400" }, { "model": "color laserjet cp6015 q3933a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.203.1" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "integrated management module ii", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.76" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "10.0-release-p5", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "laserjet m3027 multifunction printer cc479a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.1" }, { "model": "laserjet multifunction printer series q3942a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43459.310.2" }, { "model": "crossbow", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.2.3" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "9.2" }, { "model": "junos 10.4s14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "oncommand unified manager core package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.25" }, { "model": "storevirtual 600gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "413011.5" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "laserjet m4345 multifunction printer cb428a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "storevirtual 2tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.6" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.1" }, { "model": "anyconnect secure mobility client for android", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "uacos c4.4r11.1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "dsr-500n 1.09.b61", "scope": "ne", "trust": 0.3, "vendor": "d link", "version": null }, { "model": "color laserjet m651 cz255a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "unified contact center enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.16" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.8" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.11" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "storeever msl6480 tape library", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.40" }, { "model": "msr3000 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "video surveillance series ip camera", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40000" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.0" }, { "model": "color laserjet enterprise m750 d3l09a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "anyconnect secure mobility client for desktop platforms", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos space 13.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.013" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "8.3" }, { "model": "laserjet enterprise color m855 a2w79a 2302963 436076", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "800" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.67" }, { "model": "filenet system monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "spa510 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "operations automation", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "5.4" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.20" }, { "model": "4800g switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "junos 12.1x44-d34", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "flex system p460", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7895-43x)0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "4.3.7" }, { "model": "fortimail", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.4" }, { "model": "idp 4.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.00" }, { "model": "storevirtual vsa software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.5" }, { "model": "storevirtual 900gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "usg9500 v200r001c01sph902", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "data ontap smi-s agent", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.31" }, { "model": "laserjet enterprise m4555 mfp ce503a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "service manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.11" }, { "model": "sylpheed", "scope": "ne", "trust": 0.3, "vendor": "sylpheed", "version": "3.4.2" }, { "model": "host checker", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.3" }, { "model": "junos space ja2500 appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "enterprise linux server eus 6.5.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "9.0" }, { "model": "laserjet m5035 multifunction printer q7831a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.10" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "prime performance manager for sps", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "receiver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "storevirtual 4tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.0" }, { "model": "update manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "clustered data ontap antivirus connector", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.0.2" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.12" }, { "model": "secure work space", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "0" }, { "model": "color laserjet cp6015 q3935a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "53.236.1" }, { "model": "s7700\u0026s9700 v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "87100" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.2" }, { "model": "color laserjet cm4730 multifunction printer cb482a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "sterling file gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.37" }, { "model": "storevirtual 900gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "s3900 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.0.3" }, { "model": "collaboration services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "unified communications widgets click to call", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.16" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.49" }, { "model": "color laserjet cp6015 q3933a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "53.236.1" }, { "model": "softco v100r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.6" }, { "model": "enterprise manager ops center", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.13" }, { "model": "telepresence t series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "unified attendant console advanced", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "idol software", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "10.7" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "9.0.3" }, { "model": "puredata system for hadoop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.02" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.0.3" }, { "model": "ftp server", "scope": "eq", "trust": 0.3, "vendor": "cerberus", "version": "7.0.0.1" }, { "model": "proventia network security controller 1.0.3352m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "idatplex dx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79130" }, { "model": "storevirtual 450gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5600v310.1" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.169" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1" }, { "model": "fastsetup", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.11" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.4" }, { "model": "flare experience for ipad", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.26" }, { "model": "tandberg codian isdn gw", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "32100" }, { "model": "laserjet printer series q5409a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43508.250.2" }, { "model": "laserjet enterprise mfp m630 series b3g85a 2303714 233000041", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.2" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.0" }, { "model": "tivoli workload scheduler distributed", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "2.1.5-3" }, { "model": "color laserjet multifunction printer series cb483a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "400046.380.3" }, { "model": "client applications", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "jabber for ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "dgs-1500-28p", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "2.51.005" }, { "model": "security information and event management", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.4" }, { "model": "project openssl 0.9.8n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos 11.4r12", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "security network intrusion prevention system gx5208", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.1.1" }, { "model": "a6600 russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.5.1" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.1" }, { "model": "laserjet multifunction printer series q3728a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9040/90508.290.2" }, { "model": "junos space 12.3r2.8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "system x3650m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79451.42" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.36" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "color laserjet cp6015 q3932a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.203.1" }, { "model": "operations analytics", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "bcaaa", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.9" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.2" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.4" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.213" }, { "model": "vsphere support assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "manageone v100r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.7" }, { "model": "laserjet m4345 multifunction printer cb426a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "storevirtual 1tb mdl sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "tivoli netcool/system service monitor fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.34" }, { "model": "s7700\u0026s9700 v100r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.2" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.19" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70007.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "s6900 v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "junos", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "14.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.65" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.3" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.1" }, { "model": "ucs b-series servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.7.4" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.16" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.011" }, { "model": "junos r7", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.29" }, { "model": "storeever msl6480 tape library", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "junos os 11.4r12-s1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.2" }, { "model": "3par service processor sp-4.3.0.ga-17.p001", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "laserjet printer series q5407a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43508.250.2" }, { "model": "laserjet enterprise color mfp m880 a2w76a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8000" }, { "model": "client applications", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.28" }, { "model": "storevirtual hybrid san solution", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.6" }, { "model": "laserjet enterprise color m775 series cc524a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7000" }, { "model": "universal small cell series software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50003.4.2.0" }, { "model": "laserjet p4515 cb515a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudburst", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "junos 12.1r9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "junos 11.4r10-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "firepass", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.45" }, { "model": "junos 12.1x46-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "cit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.41" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.116" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.73" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.67" }, { "model": "junos 12.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.2" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.11" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.3.1" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.015" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.09" }, { "model": "sbr carrier 8.0.0-r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "documentum content server sp2", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "6.7" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.1.1" }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "storevirtual 4tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453011.5" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "7.0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77109.7" }, { "model": "laserjet pro m401a/d/dn/dnw/dw/n cf399a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "40020150212" }, { "model": "color laserjet cp3525 cc469a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.183.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.4.1" }, { "model": "guardium database activity monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "quantum policy suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "laserjet enterprise color m775 series cc522a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7000" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "msr20 russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "forticlient", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.0.614" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "asset manager 9.41.p1", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.6" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.57" }, { "model": "msr1000 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.88" }, { "model": "proxysgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.3" }, { "model": "9.2-rc2-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "utm manager", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.51" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.9" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "tivoli netcool/system service monitor fp10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3" }, { "model": "cloud server", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "6.0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.16" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "system x3630m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73771.42" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "10.0.2" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "bladesystem c-class onboard administrator", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.22" }, { "model": "fortirecorder", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "1.4.1" }, { "model": "enterprise linux long life 5.9.server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "powerlinux 7r4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "vcenter chargeback manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.6" }, { "model": "network connect", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.1.0.18193" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "463012.0" }, { "model": "storevirtual china hybrid storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.6" }, { "model": "color laserjet cp6015 q3931a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.203.1" }, { "model": "system dx360m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73211.42" }, { "model": "telepresence mxp series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "blackberry enterprise service", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.1.2" }, { "model": "infosphere balanced warehouse c4000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "fusion", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.123" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.7" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.2" }, { "model": "jetdirect ew2500 802.11b/g wireless print server j8021a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "41.16" }, { "model": "cit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.53" }, { "model": "color laserjet cm4730 multifunction printer cb483a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "50.286.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "3.1" }, { "model": "junos r2-s2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.12" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7900.00" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.50" }, { "model": "project metasploit framework", "scope": "eq", "trust": 0.3, "vendor": "metasploit", "version": "4.9.1" }, { "model": "client connector", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.0" }, { "model": "smart update manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.4" }, { "model": "integrated management module ii", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.91" }, { "model": "laserjet enterprise m4555 mfp ce738a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "junos os 12.2r9", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "color laserjet cm4730 multifunction printer cb480a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "50.286.1" }, { "model": "flare experience for ipad", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.2.2" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.1.4" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4" }, { "model": "communicator for ipad", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "lifetime key management appliance", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.20" }, { "model": "vix api", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.12" }, { "model": "srg1200\u00262200\u00263200 v100r002c02spc800", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "telepresence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70100" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "ei switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51200" }, { "model": "color laserjet cm4730 multifunction printer cb481a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "50.286.1" }, { "model": "laserjet pro m401a/d/dn/dnw/dw/n cf270a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "40020150212" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "2.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.1" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.5" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "laserjet enterprise color m855 a2w78a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8000" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.15" }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.2" }, { "model": "strm", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.26" }, { "model": "prime data center network manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "storevirtual 1tb mdl china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "infosphere balanced warehouse d5100", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "cc v200r001c31", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "junos 13.2r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.1r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "s12700 v200r005+v200r005hp0", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "xenmobile app controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "2.10" }, { "model": "websphere datapower xml accelerator xa35", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0" }, { "model": "laserjet enterprise color m775 series cc523a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7000" }, { "model": "blackberry os", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.0.10648" }, { "model": "laserjet p4014 cb507a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xenmobile app controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "2.9" }, { "model": "database and middleware automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.10" }, { "model": "oceanstor s5500t v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.0" }, { "model": "8.0-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "software development kit", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "storevirtual china hybrid san solution", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.6" }, { "model": "netscaler build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "8.047.8" }, { "model": "enterprise linux server eus 6.4.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "vcd", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.11" }, { "model": "security information and event management hf3", "scope": "ne", "trust": 0.3, "vendor": "mcafee", "version": "9.1.4" }, { "model": "laserjet enterprise color m551 series cf083a 2302963 436083", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "500" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1.2" }, { "model": "documentum content server sp2 p13", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "6.7" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "icewall sso dfw r2", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.5" }, { "model": "agent desktop for cisco unified contact center express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "laserjet p2055 printer series ce456a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "20141201" }, { "model": "messaging secure gateway", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.1" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.01" }, { "model": "9250c digital sender cb472a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "i v5r4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "smart update manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.0" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "one-x client enablement services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "netiq admininstration console server", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "0" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1.131" }, { "model": "storevirtual 450gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "s2750\u0026s5700\u0026s6700 v200r005+v200r005hp0", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.1.2" }, { "model": "sparc m10-4", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "junos 13.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "3.5" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7100" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "laserjet enterprise color m855 a2w79a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8000" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.0-76.7" }, { "model": "bbm for iphone", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "0" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.4" }, { "model": "anyconnect secure mobility client", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.3" }, { "model": "documentum content server sp2 p14", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "6.7" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.8.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "color laserjet cp6015 q3934a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "tivoli endpoint manager for remote control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "flex system enterprise chassis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8721" }, { "model": "color laserjet m651 cz257a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.0" }, { "model": "laserjet enterprise m4555 mfp ce502a 2302963 436064", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "vsphere virtual disk development kit", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "ive os 8.0r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "system storage ts2900 tape librray", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "0033" }, { "model": "laserjet enterprise m4555 mfp ce504a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "laserjet cm3530 multifunction printer cc519a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.9" }, { "model": "ecns600 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.0-77.5" }, { "model": "web gateway", "scope": "ne", "trust": 0.3, "vendor": "mcafee", "version": "7.4.2.1" }, { "model": "snapdrive for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.3" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.3" }, { "model": "laserjet p3005 printer series q7816a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.190.3" }, { "model": "jabber voice for iphone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.6" }, { "model": "9.3-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "unified ip conference phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "88310" }, { "model": "project openssl 1.0.0e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos os 12.1x46-d25", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "laserjet p4515 cb516a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.172" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "aura application server sip core pb19", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "bladecenter js22", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7998-61x)0" }, { "model": "storevirtual 450gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.15" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.65" }, { "model": "executive scorecard", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.41" }, { "model": "epolicy orchestrator", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.6.5" }, { "model": "8.4-releng", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "infosphere balanced warehouse c3000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "4.3.6" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "junos 12.3r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx7800", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "uacos c5.0", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "strm/jsa", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2013.2" }, { "model": "junos 12.3r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "z/tpf", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.10" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.40" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "storevirtual fc 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473011.5" }, { "model": "laserjet enterprise color mfp m880 d7p70a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8000" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "storevirtual 1tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "storevirtual hybrid storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.0" }, { "model": "laserjet p4515 cb514a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.2.0.9" }, { "model": "puredata system for operational analytics a1791", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "dsm v100r002c05spc615", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.6" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.55" }, { "model": "system x3400m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "78361.42" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "fortirecorder", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "1.5" }, { "model": "project openssl 0.9.8t", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cognos insight standalone fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "vdi communicator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "bladecenter js23", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7778-23x)0" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.1.5" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.0" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "msa storage gl200r007", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2040" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "icewall sso certd r3", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0" }, { "model": "command view server based management", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.3.2" }, { "model": "storevirtual 450gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.5" }, { "model": "laserjet printer series q7697a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9040/90508.260.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.161" }, { "model": "storevirtual vsa software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "12.5" }, { "model": "paging server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.0.6" }, { "model": "fortigate", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.5" }, { "model": "data ontap smi-s agent", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.2" }, { "model": "9500e family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "ace application control engine module ace20", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "laserjet enterprise m712 series cf235a 2302963 436080", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "700" }, { "model": "cloud manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "fortisandbox build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "1.3.086" }, { "model": "hyperdp oceanstor n8500 v200r001c09", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.4" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.94" }, { "model": "agent desktop for cisco unified contact center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "vcenter site recovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0.31" }, { "model": "dgs-1210-28p", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "4.00.043" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11000" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.75" }, { "model": "color laserjet m680 cz248a 2302963 436072", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.91" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "ape", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "hyperdp v200r001c91spc201", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x330073820" }, { "model": "asset manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.40" }, { "model": "unified attendant console", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "dsr-500 1.09.b61", "scope": "ne", "trust": 0.3, "vendor": "d link", "version": null }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3-64.4" }, { "model": "s3900 v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "oceanstor s5600t v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.19" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "enterprise linux server eus 6.3.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "6.0" }, { "model": "junos 10.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.10.140.0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.32" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.6" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.1.3" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "6.5" }, { "model": "storevirtual 2tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.0" }, { "model": "laserjet p3005 printer series q7814a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.190.3" }, { "model": "ace application control engine module ace10", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5600v110.1" }, { "model": "rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "20" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "36100" }, { "model": "ive os 7.4r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.21" }, { "model": "hi switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55000" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.7" }, { "model": "laserjet enterprise m4555 mfp ce503a 2302963 436064", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "msr9xx family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "storevirtual 450gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "vcenter site recovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.1" }, { "model": "nsx for multi-hypervisor", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1.2" }, { "model": "laserjet printer series q7698a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9040/90508.260.3" }, { "model": "sbr enterprise", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.17" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.63" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "junos os 13.3r2-s3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tivoli workload scheduler distributed fp07", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "msr30 russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "scale out network attached storage", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.3" }, { "model": "smart update manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3.1" }, { "model": "manageone v100r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "2.0.4" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "7.0.2" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "463011.5" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x375087330" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.20" }, { "model": "esight-ewl v300r001c10spc300", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ave2000 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "color laserjet enterprise cp4525 cc493a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.164.1" }, { "model": "executive scorecard", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.40" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.22" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.2" }, { "model": "websphere datapower b2b appliance xb62", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.1" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "laserjet multifunction printer series q3726a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9040/90508.290.2" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "9.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.82" }, { "model": "color laserjet cp4005 printer series cb504a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "46.230.6" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "4.3.1" }, { "model": "snapdrive for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.0.74.4" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "junos space 12.3p2.8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.85" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.60" }, { "model": "pulse desktop", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.0" }, { "model": "rational insight ifix1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "fortios", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.0.8" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.12" }, { "model": "tivoli workload scheduler distributed fp02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "telepresence integrator c series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "laserjet m4345 multifunction printer cb425a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "8.4-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "laserjet enterprise m602 series ce991a 2302963 436082", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473011.5" }, { "model": "malware analysis appliance", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "4.1.2" }, { "model": "usg9300 v200r001c01sph902", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "clearpass", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.1.0" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.0.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.126.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "anyoffice v200r002c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "digital media players series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "43000" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60000" }, { "model": "color laserjet flow m680 ca251a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.4" }, { "model": "splunk", "scope": "ne", "trust": 0.3, "vendor": "splunk", "version": "5.0.9" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "2.0" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.1.1" }, { "model": "bbm for android", "scope": "ne", "trust": 0.3, "vendor": "rim", "version": "2.2.1.40" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "13.10" }, { "model": "virtual automation", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.68" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.0.0" }, { "model": "color laserjet enterprise cp4025 cc490a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.34" }, { "model": "snapdrive for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.50" }, { "model": "color laserjet multifunction printer series cb481a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "400046.380.3" }, { "model": "laserjet printer series q7545a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52008.241" }, { "model": "junos 13.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2143" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "19100" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.1" }, { "model": "usg9500 usg9500 v300r001c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "laserjet printer series q5406a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43508.250.2" }, { "model": "espace u2990 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "forticlient build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.2.0591" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.34" }, { "model": "studio", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.60" }, { "model": "aura conferencing sp1 standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "laserjet enterprise mfp m525f cf116a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5000" }, { "model": "color laserjet cp3525 cc468a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudplatform", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.2" }, { "model": "telepresence isdn gw", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "32410" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.2.3" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.10" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "66020" }, { "model": "ssl visibility", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.6" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4x27.62" }, { "model": "system m5 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x310054570" }, { "model": "vcd", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.3" }, { "model": "9.0-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.4.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.8" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.4" }, { "model": "telepresence ex series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "one-x mobile ces for iphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "storevirtual 900gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473011.5" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "junos os 13.3r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59200" }, { "model": "security analytics platform", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "7.1.3" }, { "model": "oceanstor s6800t v100r005c30spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "management center", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1" }, { "model": "manageone v100r001c02 spc901", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "junos 11.4r10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security information and event management", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2" }, { "model": "xiv storage system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "281011.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.20" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.6" }, { "model": "junos 12.1x45-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "system x3500m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "78391.42" }, { "model": "utm", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "9.2" }, { "model": "oceanstor s2600t v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "color laserjet cp5525 ce707a 2302963 436070", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "enterprise linux els", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3500-" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.26" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.13" }, { "model": "email and server security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "11.00" }, { "model": "color laserjet cm6030 multifunction printer ce664a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "isoc v200r001c02spc202", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "psb email and server security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "9.20" }, { "model": "color laserjet cp3525 cc471a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "storevirtual 2tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453011.5" }, { "model": "9.2-release-p4", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "chrome os", "scope": "ne", "trust": 0.3, "vendor": "google", "version": "35.0.1916.155" }, { "model": "ons series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154000" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "4.3.5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.2" }, { "model": "unified intelligent contact management enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos space r1.8", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "clearpass", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.1.4" }, { "model": "webapp secure", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "anyconnect secure mobility client for ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "security threat response manager", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2013.2" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.11" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.70" }, { "model": "utm", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "8.3" }, { "model": "aura system manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "policy center v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x357087180" }, { "model": "laserjet enterprise p3015 ce526a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.50" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0.14" }, { "model": "junos 12.3r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.4" }, { "model": "color laserjet cp6015 q3934a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "53.236.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.170" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3700-" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.92" }, { "model": "colorqube ps", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "88704.76.0" }, { "model": "web security gateway anywhere", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.1" }, { "model": "updatexpress system packs installer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.60" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "oncommand unified manager core package", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "5.0" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.0" }, { "model": "video surveillance 4300e/4500e high-definition ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smart update manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.4.1" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.21" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3950x638370" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.3.6" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.85" }, { "model": "one-x communicator for mac os", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "x1.0" }, { "model": "color laserjet multifunction printer series cb480a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "400046.380.3" }, { "model": "vm virtualbox 4.2.0-rc3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "color laserjet cm4540 mfp cc421a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.5.2" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.50" }, { "model": "color laserjet multifunction printer series cb482a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "400046.380.3" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.16" }, { "model": "sdn for virtual environments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "laserjet multifunction printer series q3944a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43459.310.2" }, { "model": "watson explorer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.3" }, { "model": "jabber video for ipad", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 12.1x44-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 13.2r5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.51" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.8" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "jboss enterprise application platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.2" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.2" }, { "model": "junos 10.4r14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1" }, { "model": "laserjet printer series q5403a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "42508.250.2" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.56" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "webex connect client for windows", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vcsa", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.343" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.12" }, { "model": "color laserjet printer series q5982a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "380046.80.8" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.4" }, { "model": "junos pulse 4.0r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.12" }, { "model": "cognos planning fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "junos -d10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "p2 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1810v10" }, { "model": "fortiauthenticator", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.0.2" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.28" }, { "model": "junos space 13.1r1.6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "view client", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.3.1" }, { "model": "junos 10.0s25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "email and server security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "10.00" }, { "model": "system dx360m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73251.42" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.13" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "softco v200r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.52" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.0.3" }, { "model": "color laserjet cm6040 multifunction printer q3939a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52.256.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.18" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.28" }, { "model": "junos 10.4r11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "413012.6" }, { "model": "epolicy orchestrator", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.1" }, { "model": "vsphere storage appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1.3" }, { "model": "laserjet p4015 cb511a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2.0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "2.0.1" }, { "model": "flare experience for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1.2" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.17" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.18" }, { "model": "junos 12.3r4-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.36" }, { "model": "agile controller v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "nip2000\u00265000 v100r002c10hp0001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "tapi service provider", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.29" }, { "model": "datafort s-series", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.4" }, { "model": "core", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "junos r5", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.2" }, { "model": "russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "66020" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "management center", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "1.2.1.1" }, { "model": "laserjet pro m401a/d/dn/dnw/dw/n cf274a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "40020150212" }, { "model": "telepresence isdn gw mse", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "83210" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smc2.0 v100r002c01b017sp16", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.0" }, { "model": "blackberry link", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "1.2" }, { "model": "msr20-1x family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.77" }, { "model": "8.0-rc1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.17" }, { "model": "one-x mobile ces for android", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.4" }, { "model": "system x3650m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "54541.42" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.7" }, { "model": "physical access gateways", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "system m5 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x325054580" }, { "model": "cognos insight standalone", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "session border controller enterprise", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.4" }, { "model": "junos 11.4r5-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ive os 8.0r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "89410" }, { "model": "project openssl 0.9.8u", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "isoc v200r001c01spc101", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "5000" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "prime network registrar", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.13" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.36" }, { "model": "junos os 12.1x44-d40", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "watson explorer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0" }, { "model": "fortiweb", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.3.1" }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7600" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.3.3.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.114" }, { "model": "real-time compression appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.8.106" }, { "model": "lifetime key management software", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "security access manager for web appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "vcenter converter standalone", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "color laserjet cm4730 multifunction printer cb482a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "50.286.1" }, { "model": "10.0-beta", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.95" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.22" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "horizon workspace server gateway", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8.1" }, { "model": "documentum content server p06", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "7.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.89" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "junos 12.1r8-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl 1.0.0d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "prime network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "epolicy orchestrator", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.6" }, { "model": "project openssl 1.0.1e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.07" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.56" }, { "model": "laserjet multifunction printer series q3945a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43459.310.2" }, { "model": "websphere datapower xml accelerator xa35", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.0.0.15" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "executive scorecard", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.5" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.21" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.14" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.0.4" }, { "model": "isoc v200r001c00spc202", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "3000" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "60000" }, { "model": "one-x client enablement services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "small business isa500 series integrated security appliances", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flare experience for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1.1" }, { "model": "integrated management module ii", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.21" }, { "model": "netiq identity server", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "color laserjet enterprise cp4525 cc495a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.164.1" }, { "model": "junos 12.3r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.80" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.5.2" }, { "model": "real-time compression appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.9.107" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.28" }, { "model": "storevirtual hybrid san solution", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433511.5" }, { "model": "systems insight manager 7.3.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "flex system p260 compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7895-23x)0" }, { "model": "storevirtual 600gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.5" }, { "model": "laserjet enterprise mfp m630 series b3g84a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.4" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "arubaos", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.3" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "88310" }, { "model": "vcsa", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "color laserjet enterprise m750 d3l10a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.27" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.170" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "idp 4.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "horizon workspace client for windows", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8.1" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.20" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.1" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.2" }, { "model": "laserjet m3035 multifunction printer cc476a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "laserjet enterprise flow m830z mfp cf367a 2302963 436071", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "usg9500 usg9500 v300r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "power", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5750" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "config advisor", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "color laserjet cm4540 mfp cc420a 2302963 436067", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "color laserjet enterprise cp4525 cc494a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.164.1" }, { "model": "laserjet enterprise mfp m725 cf067a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "color laserjet printer series q7492a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "470046.230.6" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.9" }, { "model": "eucalyptus", "scope": "eq", "trust": 0.3, "vendor": "eucalyptus", "version": "4.0" }, { "model": "tandberg codian mse model", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "83200" }, { "model": "uma v200r001c00spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "color laserjet m680 cz249a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet m3035 multifunction printer cc477a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "isoc v200r001c00", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "3000" }, { "model": "storevirtual 450gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.1.0" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "fortimanager", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.2" }, { "model": "simatic wincc oa", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.12" }, { "model": "forticlient", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.0.10" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.22" }, { "model": "eupp v100r001c10spc002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "10" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.8" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.0" }, { "model": "websphere datapower low latency appliance xm70", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.0.0.15" }, { "model": "project openssl 0.9.8m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cognos insight standalone fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "oncommand balance", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "epolicy orchestrator", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.0" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "f1000a and s family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "rational application developer for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "stunnel", "scope": "ne", "trust": 0.3, "vendor": "stunnel", "version": "5.02" }, { "model": "u200a and m family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.57" }, { "model": "sbr carrier", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.6" }, { "model": "flex system fc5022", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "850/8700" }, { "model": "officejet enterprise color c2s12a 2302963 436074", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x555" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "storevirtual china hybrid storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433511.5" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70000" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.2.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.11" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.4.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "oceanstor s5500t v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "videoscape anyres live", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.66" }, { "model": "junos d20", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "color laserjet cm4540 mfp cc419a 2302963 436067", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.3" }, { "model": "storevirtual 450gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.31" }, { "model": "vcenter converter standalone", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "infosphere master data management patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "epolicy orchestrator", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.6.4" }, { "model": "hsr6602 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "wag310g wireless-g adsl2+ gateway with voip", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "documentum content server p07", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "7.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.44" }, { "model": "security threat response manager", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.1" }, { "model": "jabber for android", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "unified wireless ip phone series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "29200" }, { "model": "one-x mobile for blackberry", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "9.5" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.50" }, { "model": "9.0-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.14" }, { "model": "laserjet m4345 multifunction printer cb425a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.6" }, { "model": "websphere datapower soa appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.07" }, { "model": "storevirtual 1tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "ida pro", "scope": "eq", "trust": 0.3, "vendor": "hex ray", "version": "6.5" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "31.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.8" }, { "model": "junos space 14.1r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.6" }, { "model": "upward integration modules for vmware vsphere", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4x27.44" }, { "model": "prime optical for sps", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.22" }, { "model": "9.2-rc2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "color laserjet m651 cz255a 2302963 436073", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "si switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51200" }, { "model": "scanjet enterprise document capture workstation l2717a 2302963 436065", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8500" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.19" }, { "model": "laserjet p4015 cb510a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "flare experience for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1.5" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.99" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.168" }, { "model": "icewall sso agent option", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.02007" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "9.0-rc3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 13.3r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "open systems snapvault", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.41" }, { "model": "junos 12.1r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network intrusion prevention system gx4004-v2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "documentum content server", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "7.1" }, { "model": "vcd", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.6.2" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x638370" }, { "model": "storevirtual 600gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.6" }, { "model": "smart call home", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "elan", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "8.3.3" }, { "model": "oncommand unified manager core package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.0.1" }, { "model": "project openssl beta5", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.3" }, { "model": "laserjet enterprise color mfp m575dn cd645a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5000" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "system x3250m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "42511.42" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.3" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.0" }, { "model": "laserjet enterprise m806 cz245a 2302963 436075", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "storevirtual 3tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.5" }, { "model": "fortimanager", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "3.0" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.2.4" }, { "model": "suse core for", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9x86" }, { "model": "ecns610 v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.3" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "junos 13.2r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "documentum content server sp1", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "6.7" }, { "model": "horizon workspace server data", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8.1" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025308" }, { "model": "9.0-rc1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.81" }, { "model": "storage encryption", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.4" }, { "model": "laserjet m3027 multifunction printer cb416a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "storevirtual china hybrid san solution", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433511.5" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.99" }, { "model": "junos 12.3r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.108" }, { "model": "xenclient enterprise", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "5.1.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "laserjet enterprise mfp m630 series b3g84a 2303714 233000041", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "netscaler ipmi/lom interface", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "8.4-release-p8", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "msr20 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "colorqube ps", "scope": "eq", "trust": 0.3, "vendor": "xerox", "version": "85704.76.0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.9" }, { "model": "oceanstor s6800t v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "color laserjet m680 cz249a 2302963 436072", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.62" }, { "model": "servicecenter", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "bladesystem c-class virtual connect", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.30" }, { "model": "sparc m10-4s", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "fortiauthenticator build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "3.1.060" }, { "model": "laserjet enterprise m601 series ce990a 2302963 436082", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129000" }, { "model": "snapdrive for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "vcenter support assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.14" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0" }, { "model": "sbr carrier 7.6.0-r10", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.56" }, { "model": "hsr6800 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet printer series q7552a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52008.241" }, { "model": "scanjet enterprise document capture workstation l2717a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "85000" }, { "model": "project openssl 0.9.8m beta1", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.39" }, { "model": "clearpass", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.3.0" }, { "model": "bladecenter js23/js43", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7778-23x)0" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.1" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "4.3" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.185" }, { "model": "security network intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.2" }, { "model": "project openssl 0.9.8q", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11" }, { "model": "laserjet printer series q3721a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9040/90508.260.3" }, { "model": "flex system fabric en4093 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.5" }, { "model": "manageone v100r002c10 spc320", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.10" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.2" }, { "model": "svn2200 v200r001c01spc600", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational application developer for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0.1" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "messagesight server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "secblade iii", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "safe profile", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "0" }, { "model": "jabber software development kit", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.79" }, { "model": "junos 13.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "8.0" }, { "model": "laserjet m5035 multifunction printer q7830a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "jetdirect 640n eio card j8025a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "45.35" }, { "model": "junos 13.2r5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2.2" }, { "model": "vdi-in-a-box", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "5.4.4" }, { "model": "itbm standard", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0" }, { "model": "websphere datapower soa appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.00" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1.2" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-467" }, { "model": "color laserjet cp3525 cc469a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "junos 13.1r4-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.2" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "3.1.11" }, { "model": "fortivoiceos build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "3.0.3165" }, { "model": "laserjet enterprise color m551 series cf082a 2302963 436083", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "500" }, { "model": "secure analytics", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2013.2" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473011.5" }, { "model": "flare experience for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1.4" }, { "model": "eupp v100r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2" }, { "model": "security network intrusion prevention system gx6116", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "flex system fabric si4093 system interconnect module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.17" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "laserjet printer series q3722a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9040/90508.260.3" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.00" }, { "model": "junos pulse 5.0r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.14" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.22" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "13000" }, { "model": "enterprise linux eus 5.9.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.7.3" }, { "model": "laserjet p4515 cb516a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.2.3" }, { "model": "uma-db v2r1coospc101", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "security information and event management hf6", "scope": "ne", "trust": 0.3, "vendor": "mcafee", "version": "9.2.2" }, { "model": "management center", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.2" }, { "model": "project openssl 0.9.8g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "telepresence exchange system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "datafort management console", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "cms r17", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "usg9300 usg9300 v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.05" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "f1000e family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.113" }, { "model": "laserjet enterprise m601 series ce989a 2302963 436082", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "sterling file gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "oncommand unified manager core package 5.2.1p1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.0" }, { "model": "junos 11.4r6.6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.40" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "19200" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.3" }, { "model": "color laserjet cm4540 mfp cc419a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7600-" }, { "model": "blackberry enterprise service", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.1.3" }, { "model": "vsphere replication", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.6" }, { "model": "espace u2990 v200r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "msr93x russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "airwave", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "0" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.01" }, { "model": "big data extensions", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.1" }, { "model": "storevirtual 3tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.6" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "junos space 12.3r1.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "dsr-1000n rev. a1", "scope": null, "trust": 0.3, "vendor": "d link", "version": null }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.19" }, { "model": "junos 11.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "svn5500 v200r001c01spc600", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "msr50 russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "blackberry os", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.2.0.1055" }, { "model": "laserjet m5025 multifunction printer q7840a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "flex system p260 compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7895-22x)0" }, { "model": "tivoli netcool/system service monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "snapdrive for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.2" }, { "model": "jabber voice for android", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "onepk all-in-one vm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "idp 4.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "virtuozzo containers for linux", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "4.7" }, { "model": "proxysgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.5" }, { "model": "junos 12.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "laserjet enterprise m603 series ce994a 2302963 436082", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "vsphere support assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.37" }, { "model": "airwave", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "7.2" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "laserjet enterprise m806 cz245a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "color laserjet printer series q7493a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "470046.230.6" }, { "model": "msr50 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.0" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "1.6.3" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.61" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "tivoli netcool/system service monitor fp6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.41" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "8.4-rc1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 10.0s28", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.9" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "isoc v200r001c02", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "9000" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "color laserjet cp6015 q3931a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security information and event management", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.1" }, { "model": "color laserjet enterprise cp4525 cc493a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "10.0-release-p4", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.0.4" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.4.2" }, { "model": "ddos secure", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "utm", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "9.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.40" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.07" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1183.0" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "ssl visibility", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.7" }, { "model": "fortigate build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.2.0589" }, { "model": "tivoli storage flashcopy manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.18" }, { "model": "junos os 12.3r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "cms r17 r3", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "websphere datapower b2b appliance xb62", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.0.1.3" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.10" }, { "model": "color laserjet cm6030 multifunction printer ce665a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52.256.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.16" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.79" }, { "model": "manageability sdk", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.13" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "security network intrusion prevention system gx5108", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "fortiwifi", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "vix api", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.12" }, { "model": "storevirtual fc 900gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.16" }, { "model": "junos 5.0r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "fortiap", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "tivoli workload scheduler for applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.33" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2.3" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "3.1.9" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "6.4" }, { "model": "storevirtual 900gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "3.3" }, { "model": "web security gateway", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.1" }, { "model": "oncommand workflow automation", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "i v5r3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "vsphere replication", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.02" }, { "model": "clearpass", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.1.3" }, { "model": "uacos c5.0r4.1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "laserjet enterprise p3015 ce525a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "junos 13.1r.3-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "webex messenger service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "web filter", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.6" }, { "model": "snapdrive for windows", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.152" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.2" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.6" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.10" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3100v20" }, { "model": "laserjet p2055 printer series ce459a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "20141201" }, { "model": "color laserjet cm4730 multifunction printer cb483a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.3" }, { "model": "netscaler build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.196.4" }, { "model": "real-time compression appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.1.203" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8x" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.23" }, { "model": "logcenter v200r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "dynamic system analysis", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.61" }, { "model": "dgs-1210-28", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "4.00.012" }, { "model": "ssl vpn 7.4r11.1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.20" }, { "model": "laserjet enterprise m601 series ce989a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6000" }, { "model": "telepresence supervisor mse", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "80500" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "network connect", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.3.0.13725" }, { "model": "infosphere master data management server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.11" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.152" }, { "model": "color laserjet printer series q7534a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "300046.80.2" }, { "model": "horizon workspace client for mac", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.8.1" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.51" }, { "model": "rational build forge", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "storevirtual 3tb mdl sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.5" }, { "model": "netiq access manager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.0" }, { "model": "flex system enterprise chassis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7893" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "watson explorer", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.0.4" }, { "model": "s7700\u0026s9700 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "flare experience for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "netiq access manager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.2" }, { "model": "application networking manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "command view for tape libraries", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "sparc enterprise m8000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "oceanstor s2600t v100r005c30spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "laserjet enterprise color mfp m575dn cd645a 2302963 436081", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "500" }, { "model": "junos 12.1x45-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "tivoli workload scheduler distributed fp03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.4" }, { "model": "project openssl 1.0.1h", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.1.2" }, { "model": "storevirtual 450gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.5" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.4" }, { "model": "9.2-rc1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.0" }, { "model": "msr30-16 russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "jabber for windows", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "fortiwifi build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.2.0589" }, { "model": "laserjet enterprise color m855 a2w77a 2302963 436076", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "800" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.4" }, { "model": "puredata system for hadoop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.01" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.3" }, { "model": "telepresence video communication server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloudsystem chargeback", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.40" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "3.1.10" }, { "model": "blackberry os", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.1.0.2354" }, { "model": "one-x communicator for mac os", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "x1.0.3" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "7.0" }, { "model": "aura application server sip core pb3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "4.3.3" }, { "model": "netiq access gateway", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "0" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.6" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.2" }, { "model": "idp", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.1" }, { "model": "security threat response manager 2012.1r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl 1.0.0f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "99710" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "storevirtual fc 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.0" }, { "model": "laserjet m3027 multifunction printer cc479a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "sparc enterprise m3000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "color laserjet cp6015 q3932a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "53.236.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "websphere mq", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "2.0" }, { "model": "enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.6" }, { "model": "laserjet enterprise mfp m525f cf117a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5000" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.134.14" }, { "model": "management center", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.0" }, { "model": "ftp server", "scope": "ne", "trust": 0.3, "vendor": "cerberus", "version": "7.0.0.3" }, { "model": "junos 11.1r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ata analog telephone adaptor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1870" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "2.0.2" }, { "model": "project openssl 1.0.0b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.4" }, { "model": "fortimail", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.7" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "expressway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.4" }, { "model": "storage management initiative specification providers fo", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "57100" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.1" }, { "model": "storevirtual 1tb mdl sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "msr30-1x russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.15" }, { "model": "proventia network security controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1209" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.79" }, { "model": "puremessage for unix", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.04" }, { "model": "junos 11.4r5.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.1" }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.74" }, { "model": "laserjet enterprise p3015 ce595a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet p4515 cb514a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.1.2" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.03" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "clustered data ontap antivirus connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "sterling connect:direct", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "netscaler build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.070.5" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.1.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.11" }, { "model": "security information and event management ga", "scope": "ne", "trust": 0.3, "vendor": "mcafee", "version": "9.4.0" }, { "model": "junos 11.4r12-s1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "7.2.4" }, { "model": "family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125000" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.2" }, { "model": "8.4-beta1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.55" }, { "model": "officejet enterprise color c2s11a 2302963 436074", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x555" }, { "model": "web appliance", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.9.0.0" }, { "model": "tsm v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.12" }, { "model": "msr30-16 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "imc ead", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.00" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.31" }, { "model": "laserjet m5035 multifunction printer q7829a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "fortios b064", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "2.1.5-1" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.12" }, { "model": "mysql", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "5.6.20" }, { "model": "laserjet p4015 cb509a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "usg9500 v300r001c20sph102", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x353071600" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "storevirtual fc 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "laserjet m3035 multifunction printer cb414a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.25" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4x27.43" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.13" }, { "model": "asa cx context-aware security", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "color laserjet cp5525 ce709a 2302963 436070", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "horizon workspace client for windows", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5" }, { "model": "web filter", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.7" }, { "model": "project openssl 1.0.1d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.52" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "unified im and presence services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "junos 11.4r7-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "junos d10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x47" }, { "model": "security network intrusion prevention system gv200", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "laserjet enterprise color mfp m880 a2w75a 2302963 436068", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "800" }, { "model": "elog v100r003c01spc503", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.3" }, { "model": "system storage ts3400 tape library", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0040" }, { "model": "telepresence server on multiparty media", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3100" }, { "model": "cit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.40" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x357087520" }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "s5900 v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "scanjet enterprise document capture workstation l2719a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "85000" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.2.0" }, { "model": "s6900 v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "web security gateway anywhere", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.7.3" }, { "model": "storevirtual hybrid storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.5" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.1" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "storevirtual 3tb mdl sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.6" }, { "model": "storevirtual fc 900gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "junos 12.1r11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "fusionsphere v100r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.5" }, { "model": "websphere datapower soa appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.015" }, { "model": "tsm v100r002c07spc219", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "vma san gateway g5.5.1.3", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "network connect", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.4.0.14619" }, { "model": "one-x mobile lite for android", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.173" }, { "model": "smartcloud provisioning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "system dx360m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "63911.42" }, { "model": "espace iad v300r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "sterling connect:direct", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.4" }, { "model": "documentum content server sp1 p28", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "6.7" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.24" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "prime collaboration provisioning", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "security network intrusion prevention system gx7412-10", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "fortianalyzer", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.0.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.45" }, { "model": "arubaos", "scope": "ne", "trust": 0.3, "vendor": "arubanetworks", "version": "6.4.1.0" }, { "model": "cognos express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.0" }, { "model": "color laserjet cp6015 q3931a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "53.236.1" }, { "model": "9.2-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.1" }, { "model": "laserjet p3005 printer series q7815a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.190.3" }, { "model": "datafort fc-series", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "vcac", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.1" }, { "model": "vcenter site recovery manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7200" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "laserjet printer series q5408a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43508.250.2" }, { "model": "s2750\u0026s5700\u0026s6700 v200r003", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "xiv storage system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "281011.3" }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.0" }, { "model": "4210g switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "aura application server sip core pb25", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.4" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.8" }, { "model": "junos r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "14.1" }, { "model": "laserjet enterprise m603 series ce995a 2302963 436082", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.118" }, { "model": "unified series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "79000" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.88" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.4.3" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.95" }, { "model": "tivoli netcool/system service monitor fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "aura experience portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "hyperdp v200r001c09spc501", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "ei switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55000" }, { "model": "nsx for multi-hypervisor", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0.3" }, { "model": "toolscenter suite", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.52" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355079140" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.3" }, { "model": "utm", "scope": "ne", "trust": 0.3, "vendor": "sophos", "version": "9.203" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "7.3.1.1" }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453011.5" }, { "model": "telepresence", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "13100" }, { "model": "project openssl 1.0.1b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl 1.0.0k", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "laserjet enterprise mfp m725 cf069a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.10" }, { "model": "laserjet printer series q7784a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "42408.250.2" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59000" }, { "model": "project metasploit framework", "scope": "ne", "trust": 0.3, "vendor": "metasploit", "version": "4.9.3" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.0" }, { "model": "usg2000 v300r001c10spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.86" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "3.1.12" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.3.3" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "project metasploit framework", "scope": "eq", "trust": 0.3, "vendor": "metasploit", "version": "4.9.2" }, { "model": "cloudsystem enterprise software", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "storevirtual 600gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "413012.5" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "75000" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura system platform sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "watson explorer security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "junos r12", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "websphere datapower low latency appliance xm70", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.1.4" }, { "model": "9.0-release", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "epolicy orchestrator", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "4.6.7" }, { "model": "storevirtual 900gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "laserjet enterprise mfp m725 cf068a 2302963 436078", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.59" }, { "model": "laserjet enterprise mfp m725 cf068a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10500" }, { "model": "flare experience for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1.3" }, { "model": "laserjet enterprise color mfp m575dn cd644a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5000" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "junos os 14.1r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "snapdrive for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "8.4-release-p7", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "operations analytics", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "color laserjet cp3505 printer series cb442a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.160.2" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.2" }, { "model": "clustered data ontap antivirus connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.32" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.42" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.10.2" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.6" }, { "model": "laserjet printer series q5400a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "42508.250.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.1" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x357087220" }, { "model": "blackberry enterprise service", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.2.0" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3" }, { "model": "laserjet printer series q7546a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52008.241" }, { "model": "command view for tape libraries", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.8" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "unified contact center express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "laserjet printer series q7547a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52008.241" }, { "model": "svn5500 v200r001c01hp0001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.01" }, { "model": "rox", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "22.6" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "power ps701", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "color laserjet m651 cz256a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.012" }, { "model": "agent desktop for cisco unified contact center enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.8" }, { "model": "vdi communicator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0.3" }, { "model": "oceanstor s5500t v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "laserjet enterprise mfp m725 cf066a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "proxysgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1" }, { "model": "laserjet enterprise mfp m630 series b3g85a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "one-x communicator for mac os", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "x1.0.1" }, { "model": "aura messaging sp4", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "telepresence profile series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.3" }, { "model": "espace iad v300r001c07", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "3.4" }, { "model": "storevirtual 900gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "laserjet enterprise color m775 series cf304a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7000" }, { "model": "9.2-rc1-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "413012.5" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.119" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "laserjet printer series q5402a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "42508.250.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.7" }, { "model": "msr30-1x family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vcloud networking and security", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.2" }, { "model": "color laserjet printer series q7491a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "470046.230.6" }, { "model": "4510g switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.6" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.5" }, { "model": "laserjet m3035 multifunction printer cb414a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "dsr-1000 rev. a1", "scope": null, "trust": 0.3, "vendor": "d link", "version": null }, { "model": "operations automation", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "5.0" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.4" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.5" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "1.6.2" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.9" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.1.1" }, { "model": "one-x mobile lite for iphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "documentum content server sp2 p16", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "6.7" }, { "model": "sparc enterprise m5000 xcp", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1117" }, { "model": "project openssl 1.0.0a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos 12.1x44-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "4.3.2" }, { "model": "database and middleware automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.20" }, { "model": "laserjet enterprise color mfp m575dn cd644a 2302963 436081", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "500" }, { "model": "video surveillance series ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "network connect", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.0.0.12875" }, { "model": "power system s822", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "network connect 8.0r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.21-21" }, { "model": "junos pulse for android", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.22" }, { "model": "system x3550m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79441.42" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.9" }, { "model": "storevirtual 1tb mdl china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "proactive network operations center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "algo audit and compliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.2" }, { "model": "project openssl 0.9.8f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.40" }, { "model": "airwave", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "7.2.2" }, { "model": "vfabric application director", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.2" }, { "model": "color laserjet printer series q5981a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "380046.80.8" }, { "model": "enterprise virtualization", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "junos 11.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1" }, { "model": "ip video phone e20", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1.2.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "blackberry enterprise service", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.1.2.6" }, { "model": "junos 10.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storevirtual 900gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "proxysg sgos", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "6.5.4.4" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.5" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "mate products", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.2" }, { "model": "websphere datapower xml accelerator xa35", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0.8" }, { "model": "project openssl 1.0.1a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "laserjet pro m401a/d/dn/dnw/dw/n cz195a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "40020150212" }, { "model": "integrity sd2 cb900s i2 and i4 server", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.7.98" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.010" }, { "model": "flex system p260", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.4" }, { "model": "storevirtual 4tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.5" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "3.1.9" }, { "model": "firepass", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.37" }, { "model": "pulse desktop 4.0r11.1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "srg1200\u00262200\u00263200 v100r002c02hp0001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "laserjet p4015 cb510a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.0.2" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6" }, { "model": "security network intrusion prevention system gx3002", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.8" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "ive os 7.4r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "56000" }, { "model": "puredata system for hadoop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.00" }, { "model": "utm manager", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.29" }, { "model": "laserjet printer series q7699a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9040/90508.260.3" }, { "model": "messaging secure gateway", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.5" }, { "model": "junos 12.1x44-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.5.5" }, { "model": "jabber guest", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.23" }, { "model": "m220 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.03" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77009.7" }, { "model": "8.4-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.0.2" }, { "model": "s2750\u0026s5700\u0026s6700 v200r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "unified agent", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "58300" }, { "model": "jetdirect 695n eio card j8024a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "41.16" }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "7.3.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "laserjet printer series q5410a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "43508.250.2" }, { "model": "espace u19** v100r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "data recovery", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.0.3" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3.1" }, { "model": "uma v200r001c00spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.9.1" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1.0" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x350073830" }, { "model": "storevirtual 450gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.1.0" }, { "model": "idatplex dx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79120" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.21" }, { "model": "cms r16", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.4" }, { "model": "telepresence content server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "color laserjet m651 cz256a 2302963 436073", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "oceanstor s6800t v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "project openssl 0.9.8w", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos 12.1x47-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "fortisandbox", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.12" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.121" }, { "model": "digital media players series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44000" }, { "model": "vdi communicator", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0.1" }, { "model": "color laserjet printer series q7494a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "470046.230.6" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "119000" }, { "model": "secure analytics 2014.2r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.5" }, { "model": "power ps704 blade", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7891-74x)0" }, { "model": "storevirtual 450gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.120" }, { "model": "flashsystem 9843-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "laserjet enterprise mfp m725 cf067a 2302963 436078", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "laserjet enterprise p3015 ce525a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.186.1" }, { "model": "nsx for vsphere", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0.4" }, { "model": "junos 13.1r3-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.24" }, { "model": "project openssl 1.0.1g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "big-ip edge clients for linux", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7101" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "netscaler build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "8.157.3" }, { "model": "laserjet cm3530 multifunction printer cc519a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "laserjet enterprise m4555 mfp ce738a 2302963 436064", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.48" }, { "model": "horizon workspace", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5" }, { "model": "storevirtual 600gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "413012.6" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.9" }, { "model": "ips", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "espace usm v100r001 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "idp series", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "laserjet enterprise p3015 ce527a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.186.1" }, { "model": "laserjet enterprise p3015 ce526a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.186.1" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "storevirtual 1tb mdl sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "oncommand unified manager core package", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5" }, { "model": "tivoli netcool/system service monitor fp12", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "watson explorer", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.4" }, { "model": "laserjet enterprise mfp m630 series b3g86a 2303714 233000041", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system storage ts3400 tape library", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "0042" }, { "model": "email security gateway anywhere", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.1" }, { "model": "junos 12.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "storevirtual 900gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.5" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.143" }, { "model": "nexus switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "31640" }, { "model": "laserjet m3035 multifunction printer cb415a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet cm3530 multifunction printer cc520a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "messagesight server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "ive os 8.0r4.1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "fusionsphere v100r003c10spc600", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "msr93x family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.47" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.2" }, { "model": "color laserjet multifunction printer series q7520a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "400046.380.3" }, { "model": "telepresence advanced media gateway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "airwave", "scope": "ne", "trust": 0.3, "vendor": "arubanetworks", "version": "7.7.12" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.0" }, { "model": "flashsystem 9846-ae1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "840" }, { "model": "tivoli workload scheduler distributed fp03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0" }, { "model": "smc2.0 v100r002c01b025sp07", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "s2700\u0026s3700 v100r006", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "project openssl 0.9.8r", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "espace cc v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "9250c digital sender cb472a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.293.1" }, { "model": "protection service for email", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "7.1" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.31" }, { "model": "laserjet enterprise color mfp m880 d7p71a 2302963 436068", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "800" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.8" }, { "model": "netezza diagnostic tools", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0" }, { "model": "laserjet m4345 multifunction printer cb427a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.21" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "8.1.68.7" }, { "model": "elan", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "8.2" }, { "model": "isoc v200r001c01", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "5000" }, { "model": "malware analyzer g2", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.5" }, { "model": "ds8870", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "laserjet enterprise color m855 a2w77a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8000" }, { "model": "storevirtual 600gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473011.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.81" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2.15" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.2.2" }, { "model": "dgs-1500-28", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "2.51.005" }, { "model": "3par service processor sp-4.2.0.ga-29.p003", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "junos 12.1x44-d40", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "s7-1500", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1.6" }, { "model": "project openssl beta4", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.0" }, { "model": "esight-ewl v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "hyperdp oceanstor n8500 v200r001c91", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "guardium database activity monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "virtual tape library", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.70" }, { "model": "storevirtual hybrid san solution", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "cloud service automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.01" }, { "model": "project openssl 1.0.0l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "general parallel file system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.0" }, { "model": "color laserjet multifunction printer series q7518a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "400046.380.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.13" }, { "model": "simatic wincc oa", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.8" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "laserjet printer series q7544a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52008.241" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "laserjet enterprise m4555 mfp ce502a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "oic v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "junos space 13.1p1.14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "dgs-1210-20", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "4.00.041" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.3" }, { "model": "icewall sso dfw certd", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "spa300 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "laserjet enterprise m603 series ce996a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6000" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.9" }, { "model": "cit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.2" }, { "model": "color laserjet cp6015 q3932a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.53" }, { "model": "horizon workspace client for mac", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5" }, { "model": "communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "via for linux", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "2.0.0" }, { "model": "upward integration modules for microsoft system center", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.5" }, { "model": "color laserjet printer series q5983a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "380046.80.8" }, { "model": "junos 11.4r9-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl 0.9.8p", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rc2", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.2" }, { "model": "telepresence isdn link", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sbr enterprise", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6.10" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.23" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.6" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "puremessage for unix", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.05" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.4" }, { "model": "storevirtual fc 900gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.19" }, { "model": "tivoli storage productivity center fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.14" }, { "model": "sterling connect:enterprise for unix ifix03", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5.0.3" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7300" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "officejet enterprise color mfp b5l04a 2302963 436066", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x585" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.01" }, { "model": "snapdrive for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.5" }, { "model": "via for linux", "scope": "ne", "trust": 0.3, "vendor": "arubanetworks", "version": "2.0.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.17" }, { "model": "pulse desktop 5.0r3.1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.06" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3.61.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.115" }, { "model": "secure access control server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.1.2" }, { "model": "junos 5.0r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.1" }, { "model": "fortios build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.2.0589" }, { "model": "virtualization experience media engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "jetdirect 620n eio card j7934g", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "29.26" }, { "model": "junos 10.0s18", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "scanjet enterprise document capture workstation l2719a 2302963 436065", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8500" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.33" }, { "model": "jabber im for android", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.12" }, { "model": "small cell factory recovery root filesystem", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.99.4" }, { "model": "proxysgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.4" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.45" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.0.2" }, { "model": "service manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.31" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "flex system enterprise chassis", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8724" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.78" }, { "model": "ftp server", "scope": "eq", "trust": 0.3, "vendor": "cerberus", "version": "7.0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.9.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.0" }, { "model": "color laserjet flow m680 ca251a 2302963 436072", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365079150" }, { "model": "exalogic", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x3-22.0.6.2.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "storevirtual china hybrid storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.6" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.10" }, { "model": "espace vtm v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "spa122 ata with router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 10.4r", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.15" }, { "model": "web security gateway", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.3" }, { "model": "config manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.6" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.3" }, { "model": "storevirtual fc 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.6" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0.6" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "infosphere guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "ssl vpn 8.0r4.1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.2.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.4" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.5" }, { "model": "project openssl 1.0.1c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0" }, { "model": "spa525 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "data ontap smi-s agent", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4.0.15" }, { "model": "cp1543-1", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1.1.25" }, { "model": "laserjet m9050 multifunction printer cc395a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "51.256.1" }, { "model": "ive os 7.4r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.41" }, { "model": "laserjet enterprise color m551 series cf081a 2302963 436083", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "500" }, { "model": "advanced settings utility", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.52" }, { "model": "msr30 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8v" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.0" }, { "model": "color laserjet enterprise m750 d3l10a 2302963 436077", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "color laserjet cp3505 printer series cb443a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.160.2" }, { "model": "laserjet enterprise m601 series ce990a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6000" }, { "model": "oncommand workflow automation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "proxysg sgos", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "6.2.15.6" }, { "model": "algo audit and compliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.54" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x357087330" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.30" }, { "model": "utm", "scope": "ne", "trust": 0.3, "vendor": "sophos", "version": "9.113" }, { "model": "espace u2980 v100r001c02", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.3.9" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3" }, { "model": "service delivery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.4" }, { "model": "color laserjet printer series q7536a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "300046.80.2" }, { "model": "clearpass", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.2.0" }, { "model": "identity service engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "jsa 2014.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "8.2" }, { "model": "9.2-release-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.177" }, { "model": "s12700 v200r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "snapdrive for unix", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.35" }, { "model": "8.4-release-p11", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "tivoli workload scheduler distributed fp04", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "oceanstor s2200t v100r005", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.1" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3950x571431.43" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.0" }, { "model": "hsr6602 russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.18" }, { "model": "cognos metrics manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.1.1" }, { "model": "laserjet enterprise color m775 series cc524a 2302963 436079", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "700" }, { "model": "s7-1500", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.23" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5600v39.7" }, { "model": "s2900 v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "open source security information management", "scope": "ne", "trust": 0.3, "vendor": "alienvault", "version": "4.10" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "9.6" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.21" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.32" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "datafort common criteria fc-series", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "junos 11.4r7-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.20" }, { "model": "pulse desktop", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.38" }, { "model": "usg5000 v300r001c10spc200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.7" }, { "model": "ovf tool", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5.1" }, { "model": "storevirtual china hybrid san solution", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433512.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1.1" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.9" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "message networking sp4", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.5.1" }, { "model": "stunnel", "scope": "eq", "trust": 0.3, "vendor": "stunnel", "version": "5.00" }, { "model": "chargeback manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5" }, { "model": "web security gateway", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.7.3" }, { "model": "laserjet enterprise flow m830z mfp cf367a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "officejet enterprise color mfp b5l07a 2302963 436066", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x585" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "power express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7500" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.5.0.15" }, { "model": "junos 12.1x45-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "laserjet m4345 multifunction printer cb428a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.8" }, { "model": "junos 13.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.0.4" }, { "model": "fortimail build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.1.3281" }, { "model": "color laserjet enterprise m750 d3l08a 2302963 436077", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "s5900 v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "esight v2r3c10spc201", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "laserjet pro m401a/d/dn/dnw/dw/n cf278a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "40020150212" }, { "model": "ssl vpn", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.4" }, { "model": "web security gateway", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.40" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.4" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.78" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "project openssl 0.9.8l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.13" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.65" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.95" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.5" }, { "model": "vma", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.11" }, { "model": "video surveillance series ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.31" }, { "model": "s3900 v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "adaptive security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.0.8" }, { "model": "proxysgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1.6.3" }, { "model": "proxyav", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "3.5.21" }, { "model": "anyoffice emm", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "2.6.0601.0090" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.13" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.39" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.8" }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.12" }, { "model": "color laserjet enterprise m750 d3l09a 2302963 436077", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "web security", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.3" }, { "model": "service manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.33" }, { "model": "ssl for openvms", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.4-476" }, { "model": "system x3400m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73781.42" }, { "model": "strm/jsa 2013.2r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl 1.0.0i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx7412", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.171" }, { "model": "vcenter support assistant", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5.1" }, { "model": "laserjet p4015 cb511a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "msr50-g2 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "i v5r4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "storevirtual 1tb mdl china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1.21" }, { "model": "exalogic", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x4-22.0.6.2.0" }, { "model": "system x3550m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79461.42" }, { "model": "usg9500 usg9500 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "tssc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.156" }, { "model": "laserjet cm3530 multifunction printer cc520a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "53.236.1" }, { "model": "s2750\u0026s5700\u0026s6700 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "4.3.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.58" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "11.16" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0" }, { "model": "jetdirect 690n eio card j8007a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "41.16" }, { "model": "ive os", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.4" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.13" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "flex system p24l", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "ovf tool", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.17" }, { "model": "command view server based management", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "10.3.3" }, { "model": "prime network services controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "clearpass", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.2.6" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.18" }, { "model": "oic v100r001c00spc402", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "documentum content server", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "7.0" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.1" }, { "model": "mysql", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.14" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.30" }, { "model": "algo one", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.7.1" }, { "model": "icewall sso dfw", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0" }, { "model": "s7700\u0026s9700 v200r005+v200r005hp0", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "data ontap", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "7.3.1" }, { "model": "9.2-releng", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "color laserjet cm6030 multifunction printer ce665a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "vma san gateway g5.5.1.1", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.010" }, { "model": "dsr-1000 1.09.b61", "scope": "ne", "trust": 0.3, "vendor": "d link", "version": null }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "laserjet enterprise m603 series ce996a 2302963 436082", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.10" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "tivoli storage flashcopy manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "1.0.4" }, { "model": "vtm v100r001c30", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "junos space 13.3r4.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "2.4.4" }, { "model": "oceanstor s5500t v100r005c30spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "storevirtual 2tb mdl sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.5" }, { "model": "xenclient enterprise", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.1.1" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.2.4.1" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571481.43" }, { "model": "fortivoiceos", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "0" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "99510" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.1" }, { "model": "imc uam", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.00" }, { "model": "fortios", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.3.8" }, { "model": "integrated management module ii", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.86" }, { "model": "storevirtual 900gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.6" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.12" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.24" }, { "model": "system x3650m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79491.42" }, { "model": "netezza platform software", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.213" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "espace u2980 v100r001 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "intelligent management center", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cloudburst", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "laserjet enterprise m602 series ce993a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6000" }, { "model": "tivoli netcool/system service monitor fp8", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "watson explorer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.02" }, { "model": "vsphere cli", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "junos 10.4r13", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "laserjet enterprise p3015 ce528a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.71" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.54" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "fusion", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "8.4-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.3" }, { "model": "rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "22.5" }, { "model": "one-x communicator for mac os", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "x2.0.10" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "idp", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.2" }, { "model": "spa500 series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos os 13.1r4-s2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "color laserjet enterprise m750 d3l08a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.0" }, { "model": "firepass", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "system x3250m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "42521.42" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "20500" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.3.2" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.112" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.1" }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.1.5.2" }, { "model": "junos d35", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "blackberry os", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.1.0.1880" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.1.15" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.32" }, { "model": "ape", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "2.0.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.43" }, { "model": "laserjet m4345 multifunction printer cb426a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "8.4-stable", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "telepresence ip vcr series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "msr20-1x russian version", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "telepresence sx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "si switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55000" }, { "model": "aura application server sip core pb26", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.99" }, { "model": "documentum content server sp1 p26", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "6.7" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.3" }, { "model": "websphere message broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0" }, { "model": "bladesystem c-class virtual connect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.10" }, { "model": "9.2-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.1" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.2.0" }, { "model": "junos 12.1x44-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "tivoli netcool/system service monitor fp4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.28" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.1" }, { "model": "junos 12.1x45-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.2" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.178" }, { "model": "project openssl 1.0.0j", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "eupp v100r001c01spc101", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.5" }, { "model": "flex system p460 compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7895-42x)0" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "2.2.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.76" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "ecns600 v100r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "junos 13.2r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "horizon view client", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "storevirtual 600gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.6" }, { "model": "proxysgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.4.6.1" }, { "model": "service manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.21" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.8.11" }, { "model": "oceanstor s2600t v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-471" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "color laserjet enterprise cp4025 cc490a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.164.1" }, { "model": "communicator for android", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0.1" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.9" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5600v29.7" }, { "model": "security information and event management", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.131.0" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.3" }, { "model": "laserjet printer series q3723a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9040/90508.260.3" }, { "model": "aura presence services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.06" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "3par service processor sp-4.3.0.ga-17.p000", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "storevirtual 450gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453012.0" }, { "model": "color laserjet cp6015 q3935a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.203.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.27" }, { "model": "sbr carrier 7.5.0-r11", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "laserjet enterprise m603 series ce994a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6000" }, { "model": "junos 12.2r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "ave2000 v100r001c00sph001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.1.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.19" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2.21" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "8.4" }, { "model": "laserjet enterprise m4555 mfp ce504a 2302963 436064", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "junos 10.4r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.60" }, { "model": "digital sender 9200c q5916a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "9.271.3" }, { "model": "laserjet m3035 multifunction printer cc477a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "48.306.1" }, { "model": "system x3620m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73761.42" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3600v20" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "storevirtual 900gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.6" }, { "model": "tivoli netcool/system service monitor fp5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "fortiweb", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "5.0.2" }, { "model": "laserjet p3005 printer series q7812a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.190.3" }, { "model": "documentum content server sp2 p15", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "6.7" }, { "model": "laserjet enterprise color flow mfp m575c cd646a 2302963 436081", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.55" }, { "model": "tivoli workload scheduler for applications fp01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "9.2-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.90" }, { "model": "laserjet p4515 cb514a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.203.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.16" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "2.0.3" }, { "model": "10.0-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "web gateway", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "7.4.13" }, { "model": "msr4000 family", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "473012.5" }, { "model": "system x3400m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "78371.42" }, { "model": "junos 12.2r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.1.21" }, { "model": "laserjet p4014 cb506a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "laserjet enterprise mfp m525f cf116a 2302963 436069", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "500" }, { "model": "puremessage for unix", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "5.5.4" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "463012.5" }, { "model": "financial services lending and leasing", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "14.1" }, { "model": "flex system p24l compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vpn client v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "metro ethernet series access devices", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12000" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "email security gateway", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "eucalyptus", "scope": "eq", "trust": 0.3, "vendor": "eucalyptus", "version": "3.4.2" }, { "model": "3par service processor sp-4.1.0.ga-97.p011", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.25" }, { "model": "3par service processor sp-4.1.0.ga-97.p010", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "prime network", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.20" }, { "model": "cloudsystem foundation", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "database and middleware automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.01" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.30" }, { "model": "jetdirect 635n eio card j7961g", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "41.16" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.84" }, { "model": "storevirtual 900gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433012.5" }, { "model": "vdi-in-a-box", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.4.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.3" }, { "model": "junos 13.3r2-s3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.36" }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "color laserjet multifunction printer series q7517a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "400046.380.3" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "ace application control engine appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flex system p460", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "(7895-42x)0" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "junos pulse for ios", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "stunnel", "scope": "eq", "trust": 0.3, "vendor": "stunnel", "version": "5.01" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.1.18" }, { "model": "websphere datapower xml security gateway xs40", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.05" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.2" }, { "model": "tivoli network manager ip edition fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.94" }, { "model": "laserjet enterprise mfp m630 series b3g86a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "project openssl 1.0.0m", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.8" }, { "model": "dsr-500n rev. a1", "scope": null, "trust": 0.3, "vendor": "d link", "version": null }, { "model": "color laserjet m651 cz257a 2302963 436073", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "security network intrusion prevention system gx5008-v2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.21" }, { "model": "color laserjet cm6040 multifunction printer q3938a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "52.256.1" }, { "model": "netiq sslvpn server", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.45" }, { "model": "junos space", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.77" }, { "model": "storevirtual 600gb sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "413011.5" }, { "model": "color laserjet cp4005 printer series cb503a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "46.230.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.18" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.75" }, { "model": "sparc m10-1", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "nip2000\u00265000 v100r002c10spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.5" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "laserjet enterprise m603 series ce995a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6000" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.44" }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.8.0" }, { "model": "laserjet enterprise mfp m630 series j7x28a 2303714 233000041", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.166" }, { "model": "junos 11.4r3.7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "eupp v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "open source security information management", "scope": "eq", "trust": 0.3, "vendor": "alienvault", "version": "4.0.3" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "junos 13.1r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.52" }, { "model": "dsr-500 rev. a1", "scope": null, "trust": 0.3, "vendor": "d link", "version": null }, { "model": "guardium database activity monitor", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "dgs-1500.20", "scope": "eq", "trust": 0.3, "vendor": "d link", "version": "2.51.005" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "laserjet enterprise m602 series ce992a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6000" }, { "model": "project openssl 0.9.8o", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "junos d15", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45-" }, { "model": "update manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "laserjet p2055 printer series ce457a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "20141201" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.1.5" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "idol image server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.87" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.35" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x375087520" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.27" }, { "model": "oceanstor s5800t v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "blackberry os", "scope": "eq", "trust": 0.3, "vendor": "rim", "version": "10.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.36" }, { "model": "jabber for mac", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.47" }, { "model": "itbm standard", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.0.1" }, { "model": "fortigate", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.0.8" }, { "model": "storevirtual 450gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "453011.5" }, { "model": "mcp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "66000" }, { "model": "color laserjet flow m680 cz250a 2302963 436072", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.32" }, { "model": "unified series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "69000" }, { "model": "tivoli netcool/system service monitor fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "one-x communicator for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.6" }, { "model": "host checker", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "junos 12.2r8-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.21-20" }, { "model": "oceanstor s5600t v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.38" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.11" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "linerate", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3.1" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.0.6" }, { "model": "system x3400m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "73791.42" }, { "model": "laserjet enterprise color m551 series cf083a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5000" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "winscp", "scope": "eq", "trust": 0.3, "vendor": "winscp", "version": "5.1.6" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2.4" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1.2" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.35" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.97" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.34" }, { "model": "unified communications manager session management edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.22" }, { "model": "malware analyzer g2", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1" }, { "model": "video surveillance ptz ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "snapdrive for unix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "client applications", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "vm virtualbox", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.2" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "4.0.14" }, { "model": "laserjet enterprise color mfp m880 d7p71a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8000" }, { "model": "security module for cisco network registar", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "color laserjet cp3525 cc470a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.183.1" }, { "model": "sbr carrier", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "8.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.11" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.2" }, { "model": "laserjet p4014 cb512a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "open systems snapvault", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.145" }, { "model": "project openssl 0.9.8za", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storevirtual 450gb sas storage/s-buy", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "500-320" }, { "model": "cloudplatform", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.3.0.1" }, { "model": "data ontap storage management initiative specification a", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "0" }, { "model": "chrome for android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0" }, { "model": "aura application server sip core pb16", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.9" }, { "model": "idp series 5.1r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "s6900 v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.00" }, { "model": "cloudplatform", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "4.2.1" }, { "model": "puremessage for unix", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "5.5.5" }, { "model": "proventia network security controller 1.0.3350m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-122.17" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.5" }, { "model": "fortimail build", "scope": "ne", "trust": 0.3, "vendor": "fortinet", "version": "5.0.6170" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "1.9.4" }, { "model": "junos 10.4r10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "clearpass", "scope": "eq", "trust": 0.3, "vendor": "arubanetworks", "version": "6.3.2" }, { "model": "integrated management module ii", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.30" }, { "model": "vfabric web server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.3.4" }, { "model": "dsm v100r002", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.4.1" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "laserjet enterprise m712 series cf238a 2302963 436080", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "700" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "telepresence mx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "css series content services switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "115000" }, { "model": "telepresence system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "500-370" }, { "model": "tivoli workload scheduler distributed fp04", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "unified agent", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1" }, { "model": "oceanstor s5800t v100r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.35" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.10" }, { "model": "web gateway", "scope": "ne", "trust": 0.3, "vendor": "mcafee", "version": "7.3.2.10" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.05" }, { "model": "security network intrusion prevention system gx7412-05", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "icewall mcrp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "5.0.7" }, { "model": "rational tau", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.33" }, { "model": "sylpheed", "scope": "eq", "trust": 0.3, "vendor": "sylpheed", "version": "0.9.5" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "web security gateway anywhere", "scope": "eq", "trust": 0.3, "vendor": "websense", "version": "7.8.3" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "junos space 13.3r1.9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "laserjet p4515 cb517a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.213.1" }, { "model": "storevirtual 450gb china sas storage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "433011.5" }, { "model": "s7700\u0026s9700 v200r001", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "9.3-beta1", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "2.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.98" }, { "model": "laserjet enterprise color mfp m880 a2w75a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8000" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "7.1" }, { "model": "horizon workspace server gateway", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "1.5" }, { "model": "laserjet enterprise p3015 ce595a", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.186.1" }, { "model": "espace usm v100r001c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#978508" }, { "db": "BID", "id": "67899" }, { "db": "NVD", "id": "CVE-2014-0224" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "127386" }, { "db": "PACKETSTORM", "id": "127607" }, { "db": "PACKETSTORM", "id": "127936" }, { "db": "PACKETSTORM", "id": "127136" }, { "db": "PACKETSTORM", "id": "127841" }, { "db": "PACKETSTORM", "id": "127190" }, { "db": "PACKETSTORM", "id": "128345" } ], "trust": 0.7 }, "cve": "CVE-2014-0224", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2014-0224", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "ADJACENT NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "availabilityRequirement": "LOW", "baseScore": 6.4, "collateralDamagePotential": "HIGH", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "HIGH", "enviromentalScore": 8.1, "exploitability": "PROOF-OF-CONCEPT", "exploitabilityScore": 5.5, "id": "CVE-2014-0224", "impactScore": 7.8, "integrityImpact": "PARTIAL", "integrityRequirement": "MEDIUM", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "OFFICIAL FIX", "reportConfidence": "CONFIRMED", "severity": "MEDIUM", "targetDistribution": "HIGH", "trust": 0.8, "userInteractionRequired": null, "vector_string": "AV:A/AC:M/Au:N/C:C/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2014-0224", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-0224", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-0224", "trust": 0.8, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2014-0224", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#978508" }, { "db": "VULMON", "id": "CVE-2014-0224" }, { "db": "NVD", "id": "CVE-2014-0224" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability. OpenSSL is vulnerable to a man-in-the-middle attack. \nSuccessfully exploiting this issue may allow attackers to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. \n\nHP IceWall SSO Dfw and MCRP\n\nIf possible, do not use SHOST setting which allows IceWall SSO Dfw or MCRP to\nuse SSL/TLS for back-end web server connection. \n\nHP IceWall SSO Dfw Certd\n\nIf possible, set LDAPSSL to 0 to make HP SSO IceWall Certd to not use SSL/TLS\non any connection with LDAP server. \n\nNote: The HP IceWall product is only available in Japan. \nPlease note that version 7.3.3 of HP Insight Control server migration is\nincluded on the HP Insight Management 7.3 Update 2 DVD. \n\nHP has provided the installation binaries for download from the following web\nsite by using the Receive for free option:\n\nhttp://h18013.www1.hp.com/products/servers/management/fpdownload.html\n\nCustomers using HP Insight Control server migration v7.2.2 must first upgrade\nfrom v7.2.2 to v7.3 by using the HP Insight Management v7.3 DVD, and then\nupgrade to v7.3.3 by using the HP Insight Management v7.3 Update 2 DVD. \n\nCustomers running HP Insight Control server migration v7.3, v7.3.1, or\nv7.3.2, can use the HP Insight Control server migration v7.3 Update 2 DVD to\ncomplete the upgrade. \n\nFor more information on the upgrade process, please refer to the HP Insight\nManagement Installation and Upgrade Guide and Release notes, which are\navailable at the following location:\n\nhttp://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind\nex.aspx?cat=insightmanagement\n\nNOTE: The upgrade paths described above update the entire HP Insight Control\nsoftware stack. To upgrade HP Insight Control server migration only, complete\nthe following steps:\n\nCopy \"hpsmp.exe\" to the local machine from the HP Insight Management v7.3.0\nUpdate 2 DVD ISO. Create batch file with the following commands:\n@echo off\nhpsmp.exe /verysilent /SVCPATCH=Install_Through_Patch\nCopy the batch file to the folder where \"hpsmp.exe\" normally resides on the\ntarget system. \nDouble click on the batch file. \nThe HP Insight Control server migration installation starts in a command\nprompt. \nThe command prompt closes when the installation finishes. \nAfter the installation completes it creates a log file (ICmigr.log) and an\noutput file (ICmigroutput.xml) on the target system. \nDo not close or click on the command prompt while the process is completing. \nDo not run the command prompt in the background. \n\nHISTORY\nVersion:1 (rev.1) - 23 July 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. The\nupdates are available from https://h20392.www2.hp.com/portal/swdepot/displayP\nroductInfo.do?productNumber=OPENSSL11I\n\nHP-UX Release\n HP-UX OpenSSL version\n\nB.11.11 (11i v1)\n A.00.09.08za.001_HP-UX_B.11.11_32+64.depot\n\nB.11.23 (11i v2)\n A.00.09.08za.002_HP-UX_B.11.23_IA-PA.depot\n\nB.11.31 (11i v3)\n A.00.09.08za.003_HP-UX_B.11.31_IA-PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nInstall OpenSSL A.00.09.08za or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. ============================================================================\nUbuntu Security Notice USN-2232-3\nJune 23, 2014\n\nopenssl regression\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 13.10\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nUSN-2232-1 introduced a regression in OpenSSL. The upstream fix for\nCVE-2014-0224 caused a regression for certain applications that use\nrenegotiation, such as PostgreSQL. This update fixes the problem. \n\nOriginal advisory details:\n\n J=C3=BCri Aedla discovered that OpenSSL incorrectly handled invalid DTLS\n fragments. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and\n Ubuntu 14.04 LTS. (CVE-2014-0195)\n Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A\n remote attacker could use this issue to cause OpenSSL to crash, resulting\n in a denial of service. (CVE-2014-0221)\n KIKUCHI Masashi discovered that OpenSSL incorrectly handled certain\n handshakes. \n (CVE-2014-0224)\n Felix Gr=C3=B6bert and Ivan Fratri=C4=87 discovered that OpenSSL incorrectly handled\n anonymous ECDH ciphersuites. A remote attacker could use this issue to\n cause OpenSSL to crash, resulting in a denial of service. This issue only\n affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. \n (CVE-2014-3470)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n libssl1.0.0 1.0.1f-1ubuntu2.4\n\nUbuntu 13.10:\n libssl1.0.0 1.0.1e-3ubuntu1.6\n\nUbuntu 12.04 LTS:\n libssl1.0.0 1.0.1-4ubuntu5.16\n\nUbuntu 10.04 LTS:\n libssl0.9.8 0.9.8k-7ubuntu8.19\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. \n\nReferences:\n http://www.ubuntu.com/usn/usn-2232-3\n http://www.ubuntu.com/usn/usn-2232-1\n https://launchpad.net/bugs/1332643\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4\n https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6\n https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16\n https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04347622\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04347622\nVersion: 1\n\nHPSBHF03052 rev.1 - HP Intelligent Management Center (iMC), HP Network\nProducts including H3C and 3COM Routers and Switches running OpenSSL, Remote\nDenial of Service (DoS), Code Execution, Unauthorized Access, Modification or\nDisclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-06-20\nLast Updated: 2014-06-20\n\nPotential Security Impact: Remote Denial of Service (DoS), code execution,\nunauthorized access, modification of information, disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP Intelligent\nManagement Center (iMC), HP Network Products including 3COM and H3C routers\nand switches running OpenSSL. The vulnerabilities could be exploited remotely\nto create a Denial of Service (DoS), execute code, allow unauthorized access,\nmodify or disclose information. \n\nReferences:\n\nCVE-2010-5298 Remote Denial of Service (DoS) or Modification of Information\nCVE-2014-0198 Remote Unauthorized Access (only iMC impacted)\nCVE-2014-0224 Remote Unauthorized Access or Disclosure of Information\nSSRT101561\nNote: All products listed are impacted by CVE-2014-0224 . iMC is also\nimpacted by CVE-2014-0198 and CVE-2010-5298\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nPlease refer to the RESOLUTION\n section below for a list of impacted products. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2010-5298 (AV:N/AC:H/Au:N/C:N/I:P/A:P) 4.0\nCVE-2014-0198 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\nOn June 5th 2014, OpenSSL.org issued an advisory with several CVE\nvulnerabilities. HP Networking is working to release fixes for these\nvulnerabilities that impact the products in the table below. As fixed\nsoftware is made available, this security bulletin will be updated to show\nthe fixed versions. Until the software fixes are available, HP Networking is\nproviding the following information including possible workarounds to\nmitigate the risks of these vulnerabilities. \n\nDescription\n\nThe most serious issue reported is CVE-2014-0224 and it is the one discussed\nhere. To take advantage CVE-2014-0224, an attacker must:\n\nbe in between the OpenSSL client and OpenSSL server. \nbe capable of intercepting and modifying packets between the OpenSSL client\nand OpenSSL server in real time. \n\nWorkarounds\n\nHP Networking equipment is typically deployed inside firewalls and access to\nmanagement interfaces and other protocols is more tightly controlled than in\npublic environments. This deployment and security restrictions help to reduce\nthe possibility of an attacker being able to intercept both OpenSSL client\nand OpenSSL server traffic. \n\nFollowing the guidelines in the Hardening Comware-based devices can help to\nfurther reduce man-in-the-middle opportunities:\n\nhttp://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=c03536\n920\n\nFor an HP Networking device acting as an OpenSSL Server, using a patched\nOpenSSL client or non-OpenSSL client eliminates the risk. As an example, most\nmodern web browsers do not use the OpenSSL client and the sessions between\nthe HP Networking OpenSSL server and the non-OpenSSL client are not at risk\nfor this attack. For HP Networking Equipment that is using an OpenSSL client,\npatching the OpenSSL server will eliminate the risk of this attack. \n\nProtocol Notes\n\nThe following details the protocols that use OpenSSL in Comware v5 and\nComware v7:\n\nComware V7:\n\nServer:\n\nFIPS/HTTPS/Load Balancing/Session Initiation Protocol\n\nClient:\n\nLoad Balancing/OpenFlow/Session Initiation Protocol/State Machine Based\nAnti-Spoofing/Dynamic DNS\n\nComware V5:\n\nServer:\n\nCAPWAP/EAP/SSLVPN\n\nClient:\n\nDynamic DNS\n\nFamily\n Fixed Version\n HP Branded Products Impacted\n H3C Branded Products Impacted\n 3Com Branded Products Impacted\n\n12900 Switch Series\n Fix in progress\nuse mitigations\n JG619A HP FF 12910 Switch AC Chassis\nJG621A HP FF 12910 Main Processing Unit\nJG632A HP FF 12916 Switch AC Chassis\nJG634A HP FF 12916 Main Processing Unit\n\n12500\n Fix in progress\nuse mitigations\n JC085A HP A12518 Switch Chassis\nJC086A HP A12508 Switch Chassis\nJC652A HP 12508 DC Switch Chassis\nJC653A HP 12518 DC Switch Chassis\nJC654A HP 12504 AC Switch Chassis\nJC655A HP 12504 DC Switch Chassis\nJF430A HP A12518 Switch Chassis\nJF430B HP 12518 Switch Chassis\nJF430C HP 12518 AC Switch Chassis\nJF431A HP A12508 Switch Chassis\nJF431B HP 12508 Switch Chassis\nJF431C HP 12508 AC Switch Chassis\nJC072B HP 12500 Main Processing Unit\nJC808A HP 12500 TAA Main Processing Unit\n H3C S12508 Routing Switch(AC-1) (0235A0GE)\nH3C S12518 Routing Switch(AC-1) (0235A0GF)\nH3C S12508 Chassis (0235A0E6)\nH3C S12508 Chassis (0235A38N)\nH3C S12518 Chassis (0235A0E7)\nH3C S12518 Chassis (0235A38M)\n\n12500 (Comware v7)\n Fix in progress\nuse mitigations\n JC085A HP A12518 Switch Chassis\nJC086A HP A12508 Switch Chassis\nJC652A HP 12508 DC Switch Chassis\nJC653A HP 12518 DC Switch Chassis\nJC654A HP 12504 AC Switch Chassis\nJC655A HP 12504 DC Switch Chassis\nJF430A HP A12518 Switch Chassis\nJF430B HP 12518 Switch Chassis\nJF430C HP 12518 AC Switch Chassis\nJF431A HP A12508 Switch Chassis\nJF431B HP 12508 Switch Chassis\nJF431C HP 12508 AC Switch Chassis\nJC072B HP 12500 Main Processing Unit\nJG497A HP 12500 MPU w/Comware V7 OS\nJG782A HP FF 12508E AC Switch Chassis\nJG783A HP FF 12508E DC Switch Chassis\nJG784A HP FF 12518E AC Switch Chassis\nJG785A HP FF 12518E DC Switch Chassis\nJG802A HP FF 12500E MPU\n H3C S12508 Routing Switch(AC-1) (0235A0GE)\nH3C S12518 Routing Switch(AC-1) (0235A0GF)\nH3C S12508 Chassis (0235A0E6)\nH3C S12508 Chassis (0235A38N)\nH3C S12518 Chassis (0235A0E7)\nH3C S12518 Chassis (0235A38M)\n\n11900 Switch Series\n Fix in progress\nuse mitigations\n JG608A HP FF 11908-V Switch Chassis\nJG609A HP FF 11900 Main Processing Unit\n\n10500 Switch Series (Comware v5)\n Fix in progress\nuse mitigations\n JC611A HP 10508-V Switch Chassis\nJC612A HP 10508 Switch Chassis\nJC613A HP 10504 Switch Chassis\nJC614A HP 10500 Main Processing Unit\nJC748A HP 10512 Switch Chassis\nJG375A HP 10500 TAA Main Processing Unit\nJG820A HP 10504 TAA Switch Chassis\nJG821A HP 10508 TAA Switch Chassis\nJG822A HP 10508-V TAA Switch Chassis\nJG823A HP 10512 TAA Switch Chassis\n\n10500 Switch Series (Comware v7)\n Fix in progress\nuse mitigations\n JC611A HP 10508-V Switch Chassis\nJC612A HP 10508 Switch Chassis\nJC613A HP 10504 Switch Chassis\nJC748A HP 10512 Switch Chassis\nJG820A HP 10504 TAA Switch Chassis\nJG821A HP 10508 TAA Switch Chassis\nJG822A HP 10508-V TAA Switch Chassis\nJG823A HP 10512 TAA Switch Chassis\nJG496A HP 10500 Type A MPU w/Comware v7 OS\n\n9500E\n Fix in progress\nuse mitigations\n JC124A HP A9508 Switch Chassis\nJC124B HP 9505 Switch Chassis\nJC125A HP A9512 Switch Chassis\nJC125B HP 9512 Switch Chassis\nJC474A HP A9508-V Switch Chassis\nJC474B HP 9508-V Switch Chassis\n H3C S9505E Routing-Switch Chassis (0235A0G6)\nH3C S9508E-V Routing-Switch Chassis (0235A38Q)\nH3C S9512E Routing-Switch Chassis (0235A0G7)\nH3C S9508E-V Routing-Switch Chassis (0235A38Q)\nH3C S9505E Chassis w/ Fans (0235A38P)\nH3C S9512E Chassis w/ Fans (0235A38R)\n\nRouter 8800\n Fix in progress\nuse mitigations\n JC147A HP A8802 Router Chassis\nJC147B HP 8802 Router Chassis\nJC148A HP A8805 Router Chassis\nJC148B HP 8805 Router Chassis\nJC149A HP A8808 Router Chassis\nJC149B HP 8808 Router Chassis\nJC150A HP A8812 Router Chassis\nJC150B HP 8812 Router Chassis\nJC141A HP 8802 Main Control Unit Module\nJC138A HP 8805/08/12 (1E) Main Cntrl Unit Mod\nJC137A HP 8805/08/12 (2E) Main Cntrl Unit Mod\n H3C SR8805 10G Core Router Chassis (0235A0G8)\nH3C SR8808 10G Core Router Chassis (0235A0G9)\nH3C SR8812 10G Core Router Chassis (0235A0GA)\nH3C SR8802 10G Core Router Chassis (0235A0GC)\nH3C SR8802 10G Core Router Chassis (0235A31B)\nH3C SR8805 10G Core Router Chassis (0235A31C)\nH3C SR8808 10G Core Router Chassis (0235A31D)\nH3C SR8812 10G Core Router Chassis (0235A31E)\n\n7500 Switch Series\n Fix in progress\nuse mitigations\n JC666A HP A7503-S 144 Gbps Fab/MPU w 24p Gig-T\nJC697A HP A7502 TAA Main Processing Unit\nJC698A HP A7503S 144 Gbps TAA Fab/MPU w 24p GbE\nJC699A HP A7500 384Gbps TAA Fab/MPU w 2p 10-GbE\nJC700A HP A7500 384 Gbps TAA Fabric / MPU\nJC701A HP A7510 768 Gbps TAA Fabric / MPU\nJD193A HP 384 Gbps A7500 Fab Mod w/2 XFP Ports\nJD193B HP 7500 384Gbps Fab Mod w/2 XFP Ports\nJD194A HP 384 Gbps Fabric A7500 Module\nJD194B HP 7500 384Gbps Fabric Module\nJD195A HP 7500 384Gbps Advanced Fabric Module\nJD196A HP 7502 Fabric Module\nJD220A HP 7500 768Gbps Fabric Module\nJD238A HP A7510 Switch Chassis\nJD238B HP 7510 Switch Chassis\nJD239A HP A7506 Switch Chassis\nJD239B HP 7506 Switch Chassis\nJD240A HP A7503 Switch Chassis\nJD240B HP 7503 Switch Chassis\nJD241A HP A7506 Vertical Switch Chassis\nJD241B HP 7506-V Switch Chassis\nJD242A HP A7502 Switch Chassis\nJD242B HP 7502 Switch Chassis\nJD243A HP A7503 Switch Chassis w/1 Fabric Slot\nJD243B HP 7503-S Switch Chassis w/1 Fabric Slot\n H3C S7502E Ethernet Switch Chassis with Fan (0235A0G4)\nH3C S7503E Ethernet Switch Chassis with Fan (0235A0G2)\nH3C S7503E-S Ethernet Switch Chassis with Fan (0235A0G5)\nH3C S7506E Ethernet Switch Chassis with Fan (0235A0G1)\nH3C S7506E-V Ethernet Switch Chassis with Fan (0235A0G3)\nH3C S7510E Ethernet Switch Chassis with Fan (0235A0G0)\nH3C S7502E Chassis w/ fans (0235A29A)\nH3C S7503E Chassis w/ fans (0235A27R)\nH3C S7503E-S Chassis w/ fans (0235A33R)\nH3C S7506E Chassis w/ fans (0235A27Q)\nH3C S7506E-V Chassis w/ fans (0235A27S)\n\nHSR6800\n Fix in progress\nuse mitigations\n JG361A HP HSR6802 Router Chassis\nJG362A HP HSR6804 Router Chassis\nJG363A HP HSR6808 Router Chassis\nJG364A HP HSR6800 RSE-X2 Router MPU\nJG779A HP HSR6800 RSE-X2 Router TAA MPU\n\nHSR6800 Russian Version\n Fix in progress\nuse mitigations\n JG361A HP HSR6802 Router Chassis\nJG362A HP HSR6804 Router Chassis\nJG363A HP HSR6808 Router Chassis\nJG364A HP HSR6800 RSE-X2 Router MPU\nJG779A HP HSR6800 RSE-X2 Router TAA MPU\n\nHSR6602\n Fix in progress\nuse mitigations\n JG353A HP HSR6602-G Router\nJG354A HP HSR6602-XG Router\nJG776A HP HSR6602-G TAA Router\nJG777A HP HSR6602-XG TAA Router\n\nHSR6602 Russian Version\n Fix in progress\nuse mitigations\n JG353A HP HSR6602-G Router\nJG354A HP HSR6602-XG Router\nJG776A HP HSR6602-G TAA Router\nJG777A HP HSR6602-XG TAA Router\n\nA6600\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJC566A HP A6600 RSE-X1 Main Processing Unit\nJG780A HP 6600 RSE-X1 Router TAA MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\nA6600 Russian Version\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJC566A HP A6600 RSE-X1 Main Processing Unit\nJG780A HP 6600 RSE-X1 Router TAA MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n6600 MCP\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJG778A HP 6600 MCP-X2 Router TAA MPU. JG355A HP 6600 MCP-X1 Router MPU\nJG356A HP 6600 MCP-X2 Router MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n6600 MCP Russian Version\n Fix in progress\nuse mitigations\n JC177A HP 6608 Router\nJC177B HP A6608 Router Chassis\nJC178A HP 6604 Router Chassis\nJC178B HP A6604 Router Chassis\nJC496A HP 6616 Router Chassis\nJG778A HP 6600 MCP-X2 Router TAA MPU\nJG355A HP 6600 MCP-X1 Router MPU\nJG356A HP 6600 MCP-X2 Router MPU\n H3C RT-SR6608-OVS-H3 (0235A32X)\nH3C RT-SR6604-OVS-H3 (0235A37X)\nH3C SR6616 Router Chassis (0235A41D)\n\n5920 Switch Series\n Fix in progress\nuse mitigations\n JG296A HP 5920AF-24XG Switch\nJG555A HP 5920AF-24XG TAA Switch\n\n5900 Switch Series\n Fix in progress\nuse mitigations\n JC772A HP 5900AF-48XG-4QSFP+ Switch\nJG336A HP 5900AF-48XGT-4QSFP+ Switch\nJG510A HP 5900AF-48G-4XG-2QSFP+ Switch\nJG554A HP 5900AF-48XG-4QSFP+ TAA Switch\nJG838A HP FF 5900CP-48XG-4QSFP+ Switch\n\n5900 Virtual Switch\n Fix in progress\nuse mitigations\n JG814AAE HP Virtual Switch 5900v VMware E-LTU\nJG815AAE HP VSO SW for 5900v VMware E-LTU\n\n5830 Switch Series\n Fix in progress\nuse mitigations\n JC691A HP A5830AF-48G Switch w/1 Interface Slot\nJC694A HP A5830AF-96G Switch\nJG316A HP 5830AF-48G TAA Switch w/1 Intf Slot\nJG374A HP 5830AF-96G TAA Switch\n\n5820 Switch Series\n Fix in progress\nuse mitigations\n JC102A HP 5820-24XG-SFP+ Switch\nJC106A HP 5820-14XG-SFP+ Switch with 2 Slots\nJG219A HP 5820AF-24XG Switch\nJG243A HP 5820-24XG-SFP+ TAA-compliant Switch\nJG259A HP 5820X-14XG-SFP+ TAA Switch w 2 Slots\n H3C S5820X-28C 14 port (SFP Plus ) Plus 4-port BT (RJ45) Plus 2 media\nmodules Plus OSM (0235A37L)\nH3C S5820X-28S 24-port 10GBASE-X (SFP Plus ) Plus 4-port 10/100/1000BASE-T\n(RJ45) (0235A370)\n\n5800 Switch Series\n Fix in progress\nuse mitigations\n JC099A HP 5800-24G-PoE Switch\nJC100A HP 5800-24G Switch\nJC101A HP 5800-48G Switch with 2 Slots\nJC103A HP 5800-24G-SFP Switch\nJC104A HP 5800-48G-PoE Switch\nJC105A HP 5800-48G Switch\nJG225A HP 5800AF-48G Switch\nJG242A HP 5800-48G-PoE+ TAA Switch w 2 Slots\nJG254A HP 5800-24G-PoE+ TAA-compliant Switch\nJG255A HP 5800-24G TAA-compliant Switch\nJG256A HP 5800-24G-SFP TAA Switch w 1 Intf Slt\nJG257A HP 5800-48G-PoE+ TAA Switch with 1 Slot\nJG258A HP 5800-48G TAA Switch w 1 Intf Slot\n H3C S5800-32C - 24-port 1BT Plus 4-port (SFP Plus ) Plus 1 media slot\n(0235A36U)\nH3C S5800-32C-PWR - 24-port 10/100/1000BASE-T (RJ45) Plus 4-port 10GBASE-X\n(SFP Plus ) Plus 1 media module PoE (0235A36S)\nH3C S5800-32F 24-port 1000BASE-X (SFP) Plus 4-port 10GBASE-X (SFP Plus ) Plus\nmedia module (no power) (0235A374)\nH3C S5800-56C 48-port 10/100/1000BASE-T (RJ45) Plus 4port 10GBASE-X (SFP Plus\n) Plus media module (0235A379)\nH3C S5800-56C-PWR 48-port BT Plus 4 port (SFP Plus ) Plus media module\n(0235A378)\nH3C S5800-60C-PWR 48-port BT Plus 4-port SFP Plus 2 media modules Plus OSM\n(0235A36W)\n\n5500 HI Switch Series\n Fix in progress\nuse mitigations\n JG311A HP HI 5500-24G-4SFP w/2 Intf Slts Switch\nJG312A HP HI 5500-48G-4SFP w/2 Intf Slts Switch\nJG541A HP 5500-24G-PoE+-4SFP HI Switch w/2 Slt\nJG542A HP 5500-48G-PoE+-4SFP HI Switch w/2 Slt\nJG543A HP 5500-24G-SFP HI Switch w/2 Intf Slt\nJG679A HP 5500-24G-PoE+-4SFP HI TAA Swch w/2Slt\nJG680A HP 5500-48G-PoE+-4SFP HI TAA Swch w/2Slt\nJG681A HP 5500-24G-SFP HI TAA Swch w/2Slt\n\n5500 EI Switch Series\n Fix in progress\nuse mitigations\n JD373A HP 5500-24G DC EI Switch\nJD374A HP 5500-24G-SFP EI Switch\nJD375A HP 5500-48G EI Switch\nJD376A HP 5500-48G-PoE EI Switch\nJD377A HP 5500-24G EI Switch\nJD378A HP 5500-24G-PoE EI Switch\nJD379A HP 5500-24G-SFP DC EI Switch\nJG240A HP 5500-48G-PoE+ EI Switch w/2 Intf Slts\nJG241A HP 5500-24G-PoE+ EI Switch w/2 Intf Slts\nJG249A HP 5500-24G-SFP EI TAA Switch w 2 Slts\nJG250A HP 5500-24G EI TAA Switch w 2 Intf Slts\nJG251A HP 5500-48G EI TAA Switch w 2 Intf Slts\nJG252A HP 5500-24G-PoE+ EI TAA Switch w/2 Slts\nJG253A HP 5500-48G-PoE+ EI TAA Switch w/2 Slts\n H3C S5500-28C-EI Ethernet Switch (0235A253)\nH3C S5500-28F-EI Eth Switch AC Single (0235A24U)\nH3C S5500-52C-EI Ethernet Switch (0235A24X)\nH3C S5500-28C-EI-DC Ethernet Switch (0235A24S)\nH3C S5500-28C-PWR-EI Ethernet Switch (0235A255)\nH3C S5500-28F-EI Eth Swtch DC Single Pwr (0235A259)\nH3C S5500-52C-PWR-EI Ethernet Switch (0235A251)\n\n5500 SI Switch Series\n Fix in progress\nuse mitigations\n JD369A HP 5500-24G SI Switch\nJD370A HP 5500-48G SI Switch\nJD371A HP 5500-24G-PoE SI Switch\nJD372A HP 5500-48G-PoE SI Switch\nJG238A HP 5500-24G-PoE+ SI Switch w/2 Intf Slts\nJG239A HP 5500-48G-PoE+ SI Switch w/2 Intf Slts\n H3C S5500-28C-SI Ethernet Switch (0235A04U)\nH3C S5500-52C-SI Ethernet Switch (0235A04V)\nH3C S5500-28C-PWR-SI Ethernet Switch (0235A05H)\nH3C S5500-52C-PWR-SI Ethernet Switch (0235A05J)\n\n5120 EI Switch Series\n Fix in progress\nuse mitigations\n JE066A HP 5120-24G EI Switch\nJE067A HP 5120-48G EI Switch\nJE068A HP 5120-24G EI Switch with 2 Slots\nJE069A HP 5120-48G EI Switch with 2 Slots\nJE070A HP 5120-24G-PoE EI Switch with 2 Slots\nJE071A HP 5120-48G-PoE EI Switch with 2 Slots\nJG236A HP 5120-24G-PoE+ EI Switch w/2 Intf Slts\nJG237A HP 5120-48G-PoE+ EI Switch w/2 Intf Slts\nJG245A HP 5120-24G EI TAA Switch w 2 Intf Slts\nJG246A HP 5120-48G EI TAA Switch w 2 Intf Slts\nJG247A HP 5120-24G-PoE+ EI TAA Switch w 2 Slts\nJG248A HP 5120-48G-PoE+ EI TAA Switch w 2 Slts\n H3C S5120-24P-EI 24GE Plus 4ComboSFP (0235A0BQ)\nH3C S5120-28C-EI 24GE Plus 4Combo Plus 2Slt (0235A0BS)\nH3C S5120-48P-EI 48GE Plus 4ComboSFP (0235A0BR)\nH3C S5120-52C-EI 48GE Plus 4Combo Plus 2Slt (0235A0BT)\nH3C S5120-28C-PWR-EI 24G Plus 4C Plus 2S Plus POE (0235A0BU)\nH3C S5120-52C-PWR-EI 48G Plus 4C Plus 2S Plus POE (0235A0BV)\n\n5120 SI switch Series\n Fix in progress\nuse mitigations\n JE072A HP 5120-48G SI Switch\nJE073A HP 5120-16G SI Switch\nJE074A HP 5120-24G SI Switch\nJG091A HP 5120-24G-PoE+ (370W) SI Switch\nJG092A HP 5120-24G-PoE+ (170W) SI Switch\n H3C S5120-52P-SI 48GE Plus 4 SFP (0235A41W)\nH3C S5120-20P-SI L2\n16GE Plus 4SFP (0235A42B)\nH3C S5120-28P-SI 24GE Plus 4 SFP (0235A42D)\nH3C S5120-28P-HPWR-SI (0235A0E5)\nH3C S5120-28P-PWR-SI (0235A0E3)\n\n4800 G Switch Series\n Fix in progress\nuse mitigations\n JD007A HP 4800-24G Switch\nJD008A HP 4800-24G-PoE Switch\nJD009A HP 4800-24G-SFP Switch\nJD010A HP 4800-48G Switch\nJD011A HP 4800-48G-PoE Switch\n\n 3Com Switch 4800G 24-Port (3CRS48G-24-91)\n3Com Switch 4800G 24-Port SFP (3CRS48G-24S-91)\n3Com Switch 4800G 48-Port (3CRS48G-48-91)\n3Com Switch 4800G PWR 24-Port (3CRS48G-24P-91)\n3Com Switch 4800G PWR 48-Port (3CRS48G-48P-91)\n\n4510G Switch Series\n Fix in progress\nuse mitigations\n JF428A HP 4510-48G Switch\nJF847A HP 4510-24G Switch\n\n 3Com Switch 4510G 48 Port (3CRS45G-48-91)\n3Com Switch 4510G PWR 24-Port (3CRS45G-24P-91)\n3Com Switch E4510-24G (3CRS45G-24-91)\n\n4210G Switch Series\n Fix in progress\nuse mitigations\n JF844A HP 4210-24G Switch\nJF845A HP 4210-48G Switch\nJF846A HP 4210-24G-PoE Switch\n\n 3Com Switch 4210-24G (3CRS42G-24-91)\n3Com Switch 4210-48G (3CRS42G-48-91)\n3Com Switch E4210-24G-PoE (3CRS42G-24P-91)\n\n3610 Switch Series\n Fix in progress\nuse mitigations\n JD335A HP 3610-48 Switch\nJD336A HP 3610-24-4G-SFP Switch\nJD337A HP 3610-24-2G-2G-SFP Switch\nJD338A HP 3610-24-SFP Switch\n H3C S3610-52P - model LS-3610-52P-OVS (0235A22C)\nH3C S3610-28P - model LS-3610-28P-OVS (0235A22D)\nH3C S3610-28TP - model LS-3610-28TP-OVS (0235A22E)\nH3C S3610-28F - model LS-3610-28F-OVS (0235A22F)\n\n3600 V2 Switch Series\n Fix in progress\nuse mitigations\n JG299A HP 3600-24 v2 EI Switch\nJG300A HP 3600-48 v2 EI Switch\nJG301A HP 3600-24-PoE+ v2 EI Switch\nJG301B HP 3600-24-PoE+ v2 EI Switch\nJG302A HP 3600-48-PoE+ v2 EI Switch\nJG302B HP 3600-48-PoE+ v2 EI Switch\nJG303A HP 3600-24-SFP v2 EI Switch\nJG304A HP 3600-24 v2 SI Switch\nJG305A HP 3600-48 v2 SI Switch\nJG306A HP 3600-24-PoE+ v2 SI Switch\nJG306B HP 3600-24-PoE+ v2 SI Switch\nJG307A HP 3600-48-PoE+ v2 SI Switch\nJG307B HP 3600-48-PoE+ v2 SI Switch\n\n3100V2\n Fix in progress\nuse mitigations\n JD313B HP 3100-24-PoE v2 EI Switch\nJD318B HP 3100-8 v2 EI Switch\nJD319B HP 3100-16 v2 EI Switch\nJD320B HP 3100-24 v2 EI Switch\nJG221A HP 3100-8 v2 SI Switch\nJG222A HP 3100-16 v2 SI Switch\nJG223A HP 3100-24 v2 SI Switch\n\n3100V2-48\n Fix in progress\nuse mitigations\n JG315A HP 3100-48 v2 Switch\n\n1910\n Fix in progress\nuse mitigations\n JE005A HP 1910-16G Switch\nJE006A HP 1910-24G Switch\nJE007A HP 1910-24G-PoE (365W) Switch\nJE008A HP 1910-24G-PoE(170W) Switch\nJE009A HP 1910-48G Switch\nJG348A HP 1910-8G Switch\nJG349A HP 1910-8G-PoE+ (65W) Switch\nJG350A HP 1910-8G-PoE+ (180W) Switch\n 3Com Baseline Plus Switch 2900 Gigabit Family - 52 port (3CRBSG5293)\n3Com Baseline Plus Switch 2900G - 20 port (3CRBSG2093)\n3Com Baseline Plus Switch 2900G - 28 port (3CRBSG2893)\n3Com Baseline Plus Switch 2900G - 28HPWR (3CRBSG28HPWR93)\n3Com Baseline Plus Switch 2900G - 28PWR (3CRBSG28PWR93)\n\n1810v1 P2\n Fix in progress\nuse mitigations\n J9449A HP 1810-8G Switch\nJ9450A HP 1810-24G Switch\n\n1810v1 PK\n Fix in progress\nuse mitigations\n J9660A HP 1810-48G Switch\n\nMSR20\n Fix in progress\nuse mitigations\n JD432A HP A-MSR20-21 Multi-Service Router\nJD662A HP MSR20-20 Multi-Service Router\nJD663A HP MSR20-21 Multi-Service Router\nJD663B HP MSR20-21 Router\nJD664A HP MSR20-40 Multi-Service Router\nJF228A HP MSR20-40 Router\nJF283A HP MSR20-20 Router\n H3C RT-MSR2020-AC-OVS-H3C (0235A324)\nH3C RT-MSR2040-AC-OVS-H3 (0235A326)\nH3C MSR 20-20 (0235A19H)\nH3C MSR 20-21 (0235A325)\nH3C MSR 20-40 (0235A19K)\nH3C MSR-20-21 Router (0235A19J)\n\nMSR20-1X\n Fix in progress\nuse mitigations\n JD431A HP MSR20-10 Router\nJD667A HP MSR20-15 IW Multi-Service Router\nJD668A HP MSR20-13 Multi-Service Router\nJD669A HP MSR20-13 W Multi-Service Router\nJD670A HP MSR20-15 A Multi-Service Router\nJD671A HP MSR20-15 AW Multi-Service Router\nJD672A HP MSR20-15 I Multi-Service Router\nJD673A HP MSR20-11 Multi-Service Router\nJD674A HP MSR20-12 Multi-Service Router\nJD675A HP MSR20-12 W Multi-Service Router\nJD676A HP MSR20-12 T1 Multi-Service Router\nJF236A HP MSR20-15-I Router\nJF237A HP MSR20-15-A Router\nJF238A HP MSR20-15-I-W Router\nJF239A HP MSR20-11 Router\nJF240A HP MSR20-13 Router\nJF241A HP MSR20-12 Router\nJF806A HP MSR20-12-T Router\nJF807A HP MSR20-12-W Router\nJF808A HP MSR20-13-W Router\nJF809A HP MSR20-15-A-W Router\nJF817A HP MSR20-15 Router\nJG209A HP MSR20-12-T-W Router (NA)\nJG210A HP MSR20-13-W Router (NA)\n H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)\nH3C MSR 20-10 (0235A0A7)\nH3C RT-MSR2011-AC-OVS-H3 (0235A395)\nH3C RT-MSR2012-AC-OVS-H3 (0235A396)\nH3C RT-MSR2012-AC-OVS-W-H3 (0235A397)\nH3C RT-MSR2012-T-AC-OVS-H3 (0235A398)\nH3C RT-MSR2013-AC-OVS-H3 (0235A390)\nH3C RT-MSR2013-AC-OVS-W-H3 (0235A391)\nH3C RT-MSR2015-AC-OVS-A-H3 (0235A392)\nH3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)\nH3C RT-MSR2015-AC-OVS-I-H3 (0235A394)\nH3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)\nH3C MSR 20-11 (0235A31V)\nH3C MSR 20-12 (0235A32E)\nH3C MSR 20-12 T1 (0235A32B)\nH3C MSR 20-13 (0235A31W)\nH3C MSR 20-13 W (0235A31X)\nH3C MSR 20-15 A (0235A31Q)\nH3C MSR 20-15 A W (0235A31R)\nH3C MSR 20-15 I (0235A31N)\nH3C MSR 20-15 IW (0235A31P)\nH3C MSR20-12 W (0235A32G)\n\nMSR30\n Fix in progress\nuse mitigations\n JD654A HP MSR30-60 POE Multi-Service Router\nJD657A HP MSR30-40 Multi-Service Router\nJD658A HP MSR30-60 Multi-Service Router\nJD660A HP MSR30-20 POE Multi-Service Router\nJD661A HP MSR30-40 POE Multi-Service Router\nJD666A HP MSR30-20 Multi-Service Router\nJF229A HP MSR30-40 Router\nJF230A HP MSR30-60 Router\nJF232A HP RT-MSR3040-AC-OVS-AS-H3\nJF235A HP MSR30-20 DC Router\nJF284A HP MSR30-20 Router\nJF287A HP MSR30-40 DC Router\nJF801A HP MSR30-60 DC Router\nJF802A HP MSR30-20 PoE Router\nJF803A HP MSR30-40 PoE Router\nJF804A HP MSR30-60 PoE Router\n H3C MSR 30-20 Router (0235A328)\nH3C MSR 30-40 Router Host(DC) (0235A268)\nH3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)\nH3C RT-MSR3020-DC-OVS-H3 (0235A267)\nH3C RT-MSR3040-AC-OVS-H (0235A299)\nH3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)\nH3C RT-MSR3060-AC-OVS-H3 (0235A320)\nH3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)\nH3C RT-MSR3060-DC-OVS-H3 (0235A269)\nH3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S)\nH3C MSR 30-20 (0235A19L)\nH3C MSR 30-20 POE (0235A239)\nH3C MSR 30-40 (0235A20J)\nH3C MSR 30-40 POE (0235A25R)\nH3C MSR 30-60 (0235A20K)\nH3C MSR 30-60 POE (0235A25S)\nH3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)\n\nMSR30-16\n Fix in progress\nuse mitigations\n JD659A HP MSR30-16 POE Multi-Service Router\nJD665A HP MSR30-16 Multi-Service Router\nJF233A HP MSR30-16 Router\nJF234A HP MSR30-16 PoE Router\n H3C RT-MSR3016-AC-OVS-H3 (0235A327)\nH3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)\nH3C MSR 30-16 (0235A237)\nH3C MSR 30-16 POE (0235A238)\n\nMSR30-1X\n Fix in progress\nuse mitigations\n JF800A HP MSR30-11 Router\nJF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\nJG182A HP MSR30-11E Router\nJG183A HP MSR30-11F Router\nJG184A HP MSR30-10 DC Router\n H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)\nH3C RT-MSR3011-AC-OVS-H3 (0235A29L)\n\nMSR50\n Fix in progress\nuse mitigations\n JD433A HP MSR50-40 Router\nJD653A HP MSR50 Processor Module\nJD655A HP MSR50-40 Multi-Service Router\nJD656A HP MSR50-60 Multi-Service Router\nJF231A HP MSR50-60 Router\nJF285A HP MSR50-40 DC Router\nJF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n H3C MSR 50-40 Router (0235A297)\nH3C MSR5040-DC-OVS-H3C (0235A20P)\nH3C RT-MSR5060-AC-OVS-H3 (0235A298)\nH3C MSR 50-40 Chassis (0235A20N)\nH3C MSR 50-60 Chassis (0235A20L)\n\nMSR50-G2\n Fix in progress\nuse mitigations\n JD429A HP MSR50 G2 Processor Module\nJD429B HP MSR50 G2 Processor Module\n H3C H3C MSR 50 Processor Module-G2 (0231A84Q)\nH3C MSR 50 High Performance Main Processing Unit 3GE (Combo)\n256F/1GD(0231A0KL)\n\nMSR20 Russian version\n Fix in progress\nuse mitigations\n JD663B HP MSR20-21 Router\nJF228A HP MSR20-40 Router\nJF283A HP MSR20-20 Router\n H3C RT-MSR2020-AC-OVS-H3C (0235A324)\nH3C RT-MSR2040-AC-OVS-H3 (0235A326)\n\nMSR20-1X Russian version\n Fix in progress\nuse mitigations\n JD431A HP MSR20-10 Router\nJF236A HP MSR20-15-I Router\nJF237A HP MSR20-15-A Router\nJF238A HP MSR20-15-I-W Router\nJF239A HP MSR20-11 Router\nJF240A HP MSR20-13 Router\nJF241A HP MSR20-12 Router\nJF806A HP MSR20-12-T Router\nJF807A HP MSR20-12-W Router\nJF808A HP MSR20-13-W Router\nJF809A HP MSR20-15-A-W Router\nJF817A HP MSR20-15 Router\n H3C MSR 20-10 (0235A0A7)\nH3C RT-MSR2015-AC-OVS-I-H3 (0235A394)\nH3C RT-MSR2015-AC-OVS-A-H3 (0235A392)\nH3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)\nH3C RT-MSR2011-AC-OVS-H3 (0235A395)\nH3C RT-MSR2013-AC-OVS-H3 (0235A390)\nH3C RT-MSR2012-AC-OVS-H3 (0235A396)\nH3C RT-MSR2012-T-AC-OVS-H3 (0235A398)\nH3C RT-MSR2012-AC-OVS-W-H3 (0235A397)\nH3C RT-MSR2013-AC-OVS-W-H3 (0235A391)\nH3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)\nH3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)\n\nMSR30 Russian version\n Fix in progress\nuse mitigations\n JF229A HP MSR30-40 Router\nJF230A HP MSR30-60 Router\nJF235A HP MSR30-20 DC Router\nJF284A HP MSR30-20 Router\nJF287A HP MSR30-40 DC Router\nJF801A HP MSR30-60 DC Router\nJF802A HP MSR30-20 PoE Router\nJF803A HP MSR30-40 PoE Router\nJF804A HP MSR30-60 PoE Router\n H3C RT-MSR3040-AC-OVS-H (0235A299)\nH3C RT-MSR3060-AC-OVS-H3 (0235A320)\nH3C RT-MSR3020-DC-OVS-H3 (0235A267)\nH3C MSR 30-20 Router (0235A328)\nH3C MSR 30-40 Router Host(DC) (0235A268)\nH3C RT-MSR3060-DC-OVS-H3 (0235A269)\nH3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)\nH3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)\nH3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)\n\nMSR30-1X Russian version\n Fix in progress\nuse mitigations\n JF800A HP MSR30-11 Router\nJF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\nJG182A HP MSR30-11E Router\nJG183A HP MSR30-11F Router\nJG184A HP MSR30-10 DC Router\n H3C RT-MSR3011-AC-OVS-H3 (0235A29L)\nH3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)\n\nMSR30-16 Russian version\n Fix in progress\nuse mitigations\n JF233A HP MSR30-16 Router\nJF234A HP MSR30-16 PoE Router\n H3C RT-MSR3016-AC-OVS-H3 (0235A327)\nH3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)\n\nMSR50 Russian version\n Fix in progress\nuse mitigations\n JD433A HP MSR50-40 Router\nJD653A HP MSR50 Processor Module\nJD655A HP MSR50-40 Multi-Service Router\nJD656A HP MSR50-60 Multi-Service Router\nJF231A HP MSR50-60 Router\nJF285A HP MSR50-40 DC Router\nJF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n H3C MSR 50-40 Router (0235A297)\nH3C MSR 50 Processor Module (0231A791)\nH3C MSR 50-40 Chassis (0235A20N)\nH3C MSR 50-60 Chassis (0235A20L)\nH3C RT-MSR5060-AC-OVS-H3 (0235A298)\nH3C MSR5040-DC-OVS-H3C (0235A20P)\n\nMSR50 G2 Russian version\n Fix in progress\nuse mitigations\n JD429B HP MSR50 G2 Processor Module\n H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD\n(0231A0KL)\n\nMSR9XX\n Fix in progress\nuse mitigations\n JF812A HP MSR900 Router\nJF813A HP MSR920 Router\nJF814A HP MSR900-W Router\nJF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr\nJG207A HP MSR900-W Router (NA)\nJG208A HP MSR920-W Router (NA)\n H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b\n(0235A0C2)\nH3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)\nH3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)\nH3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)\n\nMSR9XX Russian version\n Fix in progress\nuse mitigations\n JF812A HP MSR900 Router\nJF813A HP MSR920 Router\nJF814A HP MSR900-W Router\nJF815A HP MSR920 2FEWAN/8FELAN/.11b/g Rtr\n H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)\nH3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)\nH3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2)\nH3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)\n\nMSR93X\n Fix in progress\nuse mitigations\n JG511A HP MSR930 Router\nJG512A HP MSR930 Wireless Router\nJG513A HP MSR930 3G Router\nJG514A HP MSR931 Router\nJG515A HP MSR931 3G Router\nJG516A HP MSR933 Router\nJG517A HP MSR933 3G Router\nJG518A HP MSR935 Router\nJG519A HP MSR935 Wireless Router\nJG520A HP MSR935 3G Router\nJG531A HP MSR931 Dual 3G Router\nJG596A HP MSR930 4G LTE/3G CDMA Router\nJG597A HP MSR936 Wireless Router\nJG665A HP MSR930 4G LTE/3G WCDMA Global Router\nJG704A HP MSR930 4G LTE/3G WCDMA ATT Router\n\nMSR93X Russian version\n Fix in progress\nuse mitigations\n JG511A HP MSR930 Router\nJG512A HP MSR930 Wireless Router\nJG513A HP MSR930 3G Router\nJG514A HP MSR931 Router\nJG515A HP MSR931 3G Router\nJG516A HP MSR933 Router\nJG517A HP MSR933 3G Router\nJG518A HP MSR935 Router\nJG519A HP MSR935 Wireless Router\nJG520A HP MSR935 3G Router\nJG531A HP MSR931 Dual 3G Router\nJG596A HP MSR930 4G LTE/3G CDMA Router\nJG597A HP MSR936 Wireless Router\nJG665A HP MSR930 4G LTE/3G WCDMA Global Router\nJG704A HP MSR930 4G LTE/3G WCDMA ATT Router\n\nMSR1000\n Fix in progress\nuse mitigations\n JG732A HP MSR1003-8 AC Router\n\nMSR2000\n Fix in progress\nuse mitigations\n JG411A HP MSR2003 AC Router\n\nMSR3000\n Fix in progress\nuse mitigations\n JG404A HP MSR3064 Router\nJG405A HP MSR3044 Router\nJG406A HP MSR3024 AC Router\nJG409A HP MSR3012 AC Router\nJG861A HP MSR3024 TAA-compliant AC Router\n\nMSR4000\n Fix in progress\nuse mitigations\n JG402A HP MSR4080 Router Chassis\nJG403A HP MSR4060 Router Chassis\nJG412A HP MSR4000 MPU-100 Main Processing Unit\n\nF5000\n Fix in progress\nuse mitigations\n JG216A HP F5000 Firewall Standalone Chassis\nJD259A HP A5000-A5 VPN Firewall Chassis\n H3C SecPath F5000-A5 Host System (0150A0AG)\n\nU200S and CS\n Fix in progress\nuse mitigations\n JD268A HP 200-CS UTM Appliance\nJD273A HP U200-S UTM Appliance\n H3C SecPath U200-S (0235A36N)\n\nU200A and M\n Fix in progress\nuse mitigations\n JD274A HP 200-M UTM Appliance\nJD275A HP U200-A UTM Appliance\n H3C SecPath U200-A (0235A36Q)\n\nF1000A and S\n Fix in progress\nuse mitigations\n JD270A HP S1000-S VPN Firewall Appliance\nJD271A HP S1000-A VPN Firewall Appliance\nJG213A HP F1000-S-EI VPN Firewall Appliance\nJG214A HP F1000-A-EI VPN Firewall Appliance\n\nSecBlade FW\n Fix in progress\nuse mitigations\n JC635A HP 12500 VPN Firewall Module\nJD245A HP 9500 VPN Firewall Module\nJD249A HP 10500/7500 Advanced VPN Firewall Mod\nJD250A HP 6600 Firewall Processing Rtr Module\nJD251A HP 8800 Firewall Processing Module\nJD255A HP 5820 VPN Firewall Module\n H3C S9500E SecBlade VPN Firewall Module (0231A0AV)\nH3C S7500E SecBlade VPN Firewall Module (0231A832)\nH3C SR66 Gigabit Firewall Module (0231A88A)\nH3C SR88 Firewall Processing Module (0231A88L)\nH3C S5820 SecBlade VPN Firewall Module (0231A94J)\n\nF1000E\n Fix in progress\nuse mitigations\n JD272A HP S1000-E VPN Firewall Appliance\n\nVSR1000\n Fix in progress\nuse mitigations\n JG810AAE HP VSR1001 Virtual Services Router\nJG811AAE HP VSR1001 Virtual Services Router\nJG812AAE HP VSR1004 Virtual Services Router\nJG813AAE HP VSR1008 Virtual Services Router\n\nWX5002/5004\n Fix in progress\nuse mitigations\n JD441A HP 5800 ACM for 64-256 APs\nJD447B HP WX5002 Access Controller\nJD448A HP A-WX5004 Access Controller\nJD448B HP WX5004 Access Controller\nJD469A HP A-WX5004 (3Com) Access Controller\nJG261A HP 5800 Access Controller OAA TAA Mod\n\nHP 850/870\n Fix in progress\nuse mitigations\n JG723A HP 870 Unified Wired-WLAN Appliance\nJG725A HP 870 Unifd Wrd-WLAN TAA Applnc\n\nHP 830\n Fix in progress\nuse mitigations\n JG640A HP 830 24P PoE+ Unifd Wired-WLAN Swch\nJG641A HP 830 8P PoE+ Unifd Wired-WLAN Swch\nJG646A HP 830 24-Port PoE+ Wrd-WLAN TAA Switch\nJG647A HP 830 8-Port PoE+ Wrd-WLAN TAA Switch\n\nHP 6000\n Fix in progress\nuse mitigations\n JG639A HP 10500/7500 20G Unified Wired-WLAN Mod\nJG645A HP 10500/7500 20G Unifd Wrd-WLAN TAA Mod\n\nM220\n Fix in progress\nuse mitigations\n J9798A HP M220 802.11n AM Access Point\nJ9799A HP M220 802.11n WW Access Point\n\nNGFW\n Fix in progress\nuse mitigations\n JC882A HP S1050F NGFW Aplnc w/DVLabs 1-yr Lic\nJC883A HP S3010F NGFW Aplnc w/DVLabs 1-yr Lic\nJC884A HP S3020F NGFW Aplnc w/DVLabs 1-yr Lic\nJC885A HP S8005F NGFW Aplnc w/DVLabs 1-yr Lic\nJC886A HP S8010F NGFW Aplnc w/DVLabs 1-yr Lic\n\niMC UAM 7.0\n Fix in progress\nuse mitigations\n JD144A HP IMC UAM S/W Module w/200-User License\nJF388A HP IMC UAM S/W Module w/200-user License\nJD435A HP IMC EAD Client Software\nJF388AAE HP IMC UAM S/W Module w/200-user E-LTU\nJG752AAE HP IMC UAM SW Mod w/ 50-user E-LTU\n\niMC EAD 7.0\n Fix in progress\nuse mitigations\n JF391AAE HP IMC EAD S/W Module w/200-user E-LTU\nJG754AAE HP IMC EAD SW Module w/ 50-user E-LTU\nJD147A HP IMC Endpoint Admission Defense Software Module with 200-user\nLicense\nJF391A HP IMC EAD S/W Module w/200-user License\n\niMC PLAT 7.0\n Fix in progress\nuse mitigations\n JF377AAE HP IMC Standard Edition Software Platform with 100-node E-LTU\nJG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU\nJG747AAE HP IMC Standard Software Platform with 50-node E-LTU\nJG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU\nJD125A HP IMC Standard Edition Software Platform with 100-node License\nJD815A HP IMC Standard Edition Software Platform with 100-node License\nJD816A HP A-IMC Standard Edition Software DVD Media\nJF377A HP IMC Standard Edition Software Platform with 100-node License\nJF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU\nJF289AAE HP Enterprise Management System to Intelligent Management Center\nUpgrade E-LTU\nTJ635AAE HP IMC for ANM 50 node pack SW E-LTU (On HP Softwares CPL\nnot HPNs)\nJF378AAE HP IMC Enterprise Edition Software Platform with 200-Node E-LTU\nJG748AAE HP IMC Enterprise Software Platform with 50-node E-LTU\nJD126A HP A-IMC Enterprise Software Platform with 200-node License\nJD808A HP A-IMC Enterprise Software Platform with 200-node License\nJD814A HP A-IMC Enterprise Edition Software DVD Media\nJF378A HP IMC Enterprise Edition Software Platform with 200-node License\nJG546AAE HP IMC Basic SW Platform w/50-node E-LTU\nJG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU\nJG550AAE HP PMM to IMC Bsc WLM Upgr w/150 AP E-LTU\nJG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU\nJG659AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU\nJG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU\nJG660AAE HP IMC Smart Connect w / WLAN Manager Virtual Appliance Edition\nE-LTU\nJG767AAE HP IMC Smart Connect with Wireless Service Manager Virtual Appliance\nSoftware E-LTU\n\nHISTORY\nVersion:1 (rev.1) - 20 June 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlOkrM4ACgkQ4B86/C0qfVn7/QCeK5T1H9dXfVQgIKSr5USqLmvq\nCtMAnjujH7e5aXfIOvxyyuB0FcSwIWCM\n=CEL7\n-----END PGP SIGNATURE-----\n. \nOpenSSL is a 3rd party product that is embedded with some HP printer\nproducts. This bulletin notifies HP Printer customers about impacted\nproducts. To obtain the updated firmware, go to www.hp.com and follow\nthese steps:\n\nSelect \"Drivers \u0026 Software\". \nEnter the appropriate product name listed in the table below into the search\nfield. \nClick on \"Search\". \nClick on the appropriate product. \nUnder \"Select operating system\" click on \"Cross operating system (BIOS,\nFirmware, Diagnostics, etc.)\"\nNote: If the \"Cross operating system ...\" link is not present, select\napplicable Windows operating system from the list. \nSelect the appropriate firmware update under \"Firmware\". \n\nFirmware Updates Table\n\nProduct Name\n Model Number\n Firmware Revision\n\nHP Color LaserJet CM4540 MFP\n CC419A, CC420A, CC421A\n v 2302963_436067 (or higher)\n\nHP Color LaserJet CP5525\n CE707A,CE708A,CE709A\n v 2302963_436070 (or higher)\n\nHP Color LaserJet Enterprise M750\n D3L08A, D3L09A, D3L10A\n v 2302963_436077 (or higher)\n\nHP Color LaserJet M651\n CZ255A, CZ256A, CZ257A, CZ258A\n v 2302963_436073 (or higher)\n\nHP Color LaserJet M680\n CZ248A, CZ249A\n v 2302963_436072 (or higher)\n\nHP Color LaserJet Flow M680\n CZ250A, CA251A\n v 2302963_436072 (or higher)\n\nHP LaserJet Enterprise 500 color MFP M575dn\n CD644A, CD645A\n v 2302963_436081 (or higher)\n\nHP LaserJet Enterprise 500 MFP M525f\n CF116A, CF117A\n v 2302963_436069 (or higher)\n\nHP LaserJet Enterprise 600 M601 Series\n CE989A, CE990A\n v 2302963_436082 (or higher)\n\nHP LaserJet Enterprise 600 M602 Series\n CE991A, CE992A, CE993A\n v 2302963_436082 (or higher)\n\nHP LaserJet Enterprise 600 M603 Series\n CE994A, CE995A, CE996A\n v 2302963_436082 (or higher)\n\nHP LaserJet Enterprise MFP M630 series\n B3G84A, B3G85A, B3G86A, J7X28A\n v 2303714_233000041 (or higher)\n\nHP LaserJet Enterprise 700 color M775 series\n CC522A, CC523A, CC524A, CF304A\n v 2302963_436079 (or higher)\n\nHP LaserJet Enterprise 700 M712 series\n CF235A, CF236A, CF238A\n v 2302963_436080 (or higher)\n\nHP LaserJet Enterprise 800 color M855\n A2W77A, A2W78A, A2W79A\n v 2302963_436076 (or higher)\n\nHP LaserJet Enterprise 800 color MFP M880\n A2W76A, A2W75A, D7P70A, D7P71A\n v 2302963_436068 (or higher)\n\nHP LaserJet Enterprise Color 500 M551 Series\n CF081A,CF082A,CF083A\n v 2302963_436083 (or higher)\n\nHP LaserJet Enterprise color flow MFP M575c\n CD646A\n v 2302963_436081 (or higher)\n\nHP LaserJet Enterprise flow M830z MFP\n CF367A\n v 2302963_436071 (or higher)\n\nHP LaserJet Enterprise flow MFP M525c\n CF118A\n v 2302963_436069 (or higher)\n\nHP LaserJet Enterprise M4555 MFP\n CE502A,CE503A, CE504A, CE738A\n v 2302963_436064 (or higher)\n\nHP LaserJet Enterprise M806\n CZ244A, CZ245A\n v 2302963_436075 (or higher)\n\nHP LaserJet Enterprise MFP M725\n CF066A, CF067A, CF068A, CF069A\n v 2302963_436078 (or higher)\n\nHP Scanjet Enterprise 8500 Document Capture Workstation\n L2717A, L2719A\n v 2302963_436065 (or higher)\n\nOfficeJet Enterprise Color MFP X585\n B5L04A, B5L05A,B5L07A\n v 2302963_436066 (or higher)\n\nOfficeJet Enterprise Color X555\n C2S11A, C2S12A\n v 2302963_436074 (or higher)\n\nHP Color LaserJet CP3525\n CC468A, CC469A, CC470A, CC471A\n v 06.183.1 (or higher)\n\nHP LaserJet M4345 Multifunction Printer\n CB425A, CB426A, CB427A, CB428A\n v 48.306.1 (or higher)\n\nHP LaserJet M5025 Multifunction Printer\n Q7840A\n v 48.306.1 (or higher)\n\nHP Color LaserJet CM6040 Multifunction Printer\n Q3938A, Q3939A\n v 52.256.1 (or higher)\n\nHP Color LaserJet Enterprise CP4525\n CC493A, CC494A, CC495A\n v 07.164.1 (or higher)\n\nHP Color LaserJet Enterprise CP4025\n CC489A, CC490A\n v 07.164.1 (or higher)\n\nHP LaserJet M5035 Multifunction Printer\n Q7829A, Q7830A, Q7831A\n v 48.306.1 (or higher)\n\nHP LaserJet M9050 Multifunction Printer\n CC395A\n v 51.256.1 (or higher)\n\nHP LaserJet M9040 Multifunction Printer\n CC394A\n v 51.256.1 (or higher)\n\nHP Color LaserJet CM4730 Multifunction Printer\n CB480A, CB481A, CB482A, CB483A\n v 50.286.1 (or higher)\n\nHP LaserJet M3035 Multifunction Printer\n CB414A, CB415A, CC476A, CC477A\n v 48.306.1 (or higher)\n\nHP 9250c Digital Sender\n CB472A\n v 48.293.1 (or higher)\n\nHP LaserJet Enterprise P3015\n CE525A,CE526A,CE527A,CE528A,CE595A\n v 07.186.1 (or higher)\n\nHP LaserJet M3027 Multifunction Printer\n CB416A, CC479A\n v 48.306.1 (or higher)\n\nHP LaserJet CM3530 Multifunction Printer\n CC519A, CC520A\n v 53.236.1 (or higher)\n\nHP Color LaserJet CP6015\n Q3931A, Q3932A, Q3933A, Q3934A, Q3935A\n v 04.203.1 (or higher)\n\nHP LaserJet P4515\n CB514A,CB515A, CB516A, CB517A\n v 04.213.1 (or higher)\n\nHP Color LaserJet CM6030 Multifunction Printer\n CE664A, CE665A\n v 52.256.1 (or higher)\n\nHP LaserJet P4015\n CB509A, CB526A, CB511A, CB510A\n v 04.213.1 (or higher)\n\nHP LaserJet P4014\n CB507A, CB506A, CB512A\n v 04.213.1 (or higher)\n\nHISTORY\nVersion:1 (rev.1) - 22 September 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy", "sources": [ { "db": "NVD", "id": "CVE-2014-0224" }, { "db": "CERT/CC", "id": "VU#978508" }, { "db": "BID", "id": "67899" }, { "db": "VULMON", "id": "CVE-2014-0224" }, { "db": "PACKETSTORM", "id": "127386" }, { "db": "PACKETSTORM", "id": "127607" }, { "db": "PACKETSTORM", "id": "127936" }, { "db": "PACKETSTORM", "id": "127136" }, { "db": "PACKETSTORM", "id": "127841" }, { "db": "PACKETSTORM", "id": "127166" }, { "db": "PACKETSTORM", "id": "127190" }, { "db": "PACKETSTORM", "id": "128345" } ], "trust": 2.7 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.kb.cert.org/vuls/id/978508", "trust": 0.8, "type": "poc" } ], "sources": [ { "db": "CERT/CC", "id": "VU#978508" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0224", "trust": 2.2 }, { "db": "CERT/CC", "id": "VU#978508", "trust": 2.1 }, { "db": "JUNIPER", "id": "JSA10629", "trust": 1.3 }, { "db": "MCAFEE", "id": "SB10075", "trust": 1.3 }, { "db": "SECUNIA", "id": "59215", "trust": 1.0 }, { "db": "SECUNIA", "id": "59441", "trust": 1.0 }, { "db": "SECUNIA", "id": "59784", "trust": 1.0 }, { "db": "SECUNIA", "id": "59885", "trust": 1.0 }, { "db": "SECUNIA", "id": "59495", "trust": 1.0 }, { "db": "SECUNIA", "id": "60049", "trust": 1.0 }, { "db": "SECUNIA", "id": "59375", "trust": 1.0 }, { "db": "SECUNIA", "id": "59132", "trust": 1.0 }, { "db": "SECUNIA", "id": "59446", "trust": 1.0 }, { "db": "SECUNIA", "id": "59827", "trust": 1.0 }, { "db": "SECUNIA", "id": "59380", "trust": 1.0 }, { "db": "SECUNIA", "id": "59490", "trust": 1.0 }, { "db": "SECUNIA", "id": "59655", "trust": 1.0 }, { "db": "SECUNIA", "id": "58713", "trust": 1.0 }, { "db": "SECUNIA", "id": "59365", "trust": 1.0 }, { "db": "SECUNIA", "id": "59451", "trust": 1.0 }, { "db": "SECUNIA", "id": "58639", "trust": 1.0 }, { "db": "SECUNIA", "id": "59666", "trust": 1.0 }, { "db": "SECUNIA", "id": "59916", "trust": 1.0 }, { "db": "SECUNIA", "id": "59055", "trust": 1.0 }, { "db": "SECUNIA", "id": "59530", "trust": 1.0 }, { "db": "SECUNIA", "id": "58615", "trust": 1.0 }, { "db": "SECUNIA", "id": "58939", "trust": 1.0 }, { "db": "SECUNIA", "id": "59721", "trust": 1.0 }, { "db": "SECUNIA", "id": "59287", "trust": 1.0 }, { "db": "SECUNIA", "id": "59502", "trust": 1.0 }, { "db": "SECUNIA", "id": "59529", "trust": 1.0 }, { "db": "SECUNIA", "id": "59450", "trust": 1.0 }, { "db": "SECUNIA", "id": "58579", "trust": 1.0 }, { "db": "SECUNIA", "id": "59338", "trust": 1.0 }, { "db": "SECUNIA", "id": "59824", "trust": 1.0 }, { "db": "SECUNIA", "id": "59310", "trust": 1.0 }, { "db": "SECUNIA", "id": "59202", "trust": 1.0 }, { "db": "SECUNIA", "id": "59990", "trust": 1.0 }, { "db": "SECUNIA", "id": "58977", "trust": 1.0 }, { "db": "SECUNIA", "id": "59449", "trust": 1.0 }, { "db": "SECUNIA", "id": "59135", "trust": 1.0 }, { "db": "SECUNIA", "id": "59518", "trust": 1.0 }, { "db": "SECUNIA", "id": "59163", "trust": 1.0 }, { "db": "SECUNIA", "id": "59429", "trust": 1.0 }, { "db": "SECUNIA", "id": "59445", "trust": 1.0 }, { "db": "SECUNIA", "id": "60567", "trust": 1.0 }, { "db": "SECUNIA", "id": "59300", "trust": 1.0 }, { "db": "SECUNIA", "id": "59447", "trust": 1.0 }, { "db": "SECUNIA", "id": "59362", "trust": 1.0 }, { "db": "SECUNIA", "id": "59231", "trust": 1.0 }, { "db": "SECUNIA", "id": "59389", "trust": 1.0 }, { "db": "SECUNIA", "id": "61254", "trust": 1.0 }, { "db": "SECUNIA", "id": "59589", "trust": 1.0 }, { "db": "SECUNIA", "id": "59878", "trust": 1.0 }, { "db": "SECUNIA", "id": "59305", "trust": 1.0 }, { "db": "SECUNIA", "id": "60066", "trust": 1.0 }, { "db": "SECUNIA", "id": "60577", "trust": 1.0 }, { "db": "SECUNIA", "id": "59354", "trust": 1.0 }, { "db": "SECUNIA", "id": "59454", "trust": 1.0 }, { "db": "SECUNIA", "id": "59514", "trust": 1.0 }, { "db": "SECUNIA", "id": "59214", "trust": 1.0 }, { "db": "SECUNIA", "id": "59301", "trust": 1.0 }, { "db": "SECUNIA", "id": "59435", "trust": 1.0 }, { "db": "SECUNIA", "id": "58743", "trust": 1.0 }, { "db": "SECUNIA", "id": "58667", "trust": 1.0 }, { "db": "SECUNIA", "id": "59347", "trust": 1.0 }, { "db": "SECUNIA", "id": "59383", "trust": 1.0 }, { "db": "SECUNIA", "id": "59325", "trust": 1.0 }, { "db": "SECUNIA", "id": "59264", "trust": 1.0 }, { "db": "SECUNIA", "id": "59528", "trust": 1.0 }, { "db": "SECUNIA", "id": "59306", "trust": 1.0 }, { "db": "SECUNIA", "id": "58128", "trust": 1.0 }, { "db": "SECUNIA", "id": "59190", "trust": 1.0 }, { "db": "SECUNIA", "id": "58759", "trust": 1.0 }, { "db": "SECUNIA", "id": "58745", "trust": 1.0 }, { "db": "SECUNIA", "id": "59460", "trust": 1.0 }, { "db": "SECUNIA", "id": "59004", "trust": 1.0 }, { "db": "SECUNIA", "id": "59440", "trust": 1.0 }, { "db": "SECUNIA", "id": "59101", "trust": 1.0 }, { "db": "SECUNIA", "id": "59491", "trust": 1.0 }, { "db": "SECUNIA", "id": "59162", "trust": 1.0 }, { "db": "SECUNIA", "id": "59370", "trust": 1.0 }, { "db": "SECUNIA", "id": "59282", "trust": 1.0 }, { "db": "SECUNIA", "id": "59364", "trust": 1.0 }, { "db": "SECUNIA", "id": "59063", "trust": 1.0 }, { "db": "SECUNIA", "id": "59368", "trust": 1.0 }, { "db": "SECUNIA", "id": "59448", "trust": 1.0 }, { "db": "SECUNIA", "id": "58714", "trust": 1.0 }, { "db": "SECUNIA", "id": "59659", "trust": 1.0 }, { "db": "SECUNIA", "id": "59444", "trust": 1.0 }, { "db": "SECUNIA", "id": "59223", "trust": 1.0 }, { "db": "SECUNIA", "id": "59043", "trust": 1.0 }, { "db": "SECUNIA", "id": "59186", "trust": 1.0 }, { "db": "SECUNIA", "id": "58433", "trust": 1.0 }, { "db": "SECUNIA", "id": "59342", "trust": 1.0 }, { "db": "SECUNIA", "id": "58492", "trust": 1.0 }, { "db": "SECUNIA", "id": "59167", "trust": 1.0 }, { "db": "SECUNIA", "id": "59437", "trust": 1.0 }, { "db": "SECUNIA", "id": "59175", "trust": 1.0 }, { "db": "SECUNIA", "id": "59093", "trust": 1.0 }, { "db": "SECUNIA", "id": "60522", "trust": 1.0 }, { "db": "SECUNIA", "id": "59126", "trust": 1.0 }, { "db": "SECUNIA", "id": "59483", "trust": 1.0 }, { "db": "SECUNIA", "id": "58660", "trust": 1.0 }, { "db": "SECUNIA", "id": "59211", "trust": 1.0 }, { "db": "SECUNIA", "id": "59442", "trust": 1.0 }, { "db": "SECUNIA", "id": "59525", "trust": 1.0 }, { "db": "SECUNIA", "id": "59602", "trust": 1.0 }, { "db": "SECUNIA", "id": "59284", "trust": 1.0 }, { "db": "SECUNIA", "id": "58385", "trust": 1.0 }, { "db": "SECUNIA", "id": "59459", "trust": 1.0 }, { "db": "SECUNIA", "id": "58719", "trust": 1.0 }, { "db": "SECUNIA", "id": "60819", "trust": 1.0 }, { "db": "SECUNIA", "id": "59142", "trust": 1.0 }, { "db": "SECUNIA", "id": "58945", "trust": 1.0 }, { "db": "SECUNIA", "id": "59189", "trust": 1.0 }, { "db": "SECUNIA", "id": "59120", "trust": 1.0 }, { "db": "SECUNIA", "id": "61815", "trust": 1.0 }, { "db": "SECUNIA", "id": "59438", "trust": 1.0 }, { "db": "SECUNIA", "id": "58337", "trust": 1.0 }, { "db": "SECUNIA", "id": "58930", "trust": 1.0 }, { "db": "SECUNIA", "id": "59894", "trust": 1.0 }, { "db": "SECUNIA", "id": "59374", "trust": 1.0 }, { "db": "SECUNIA", "id": "60571", "trust": 1.0 }, { "db": "SECUNIA", "id": "59012", "trust": 1.0 }, { "db": "SECUNIA", "id": "59191", "trust": 1.0 }, { "db": "SECUNIA", "id": "59192", "trust": 1.0 }, { "db": "SECUNIA", "id": "59506", "trust": 1.0 }, { "db": "SECUNIA", "id": "58742", "trust": 1.0 }, { "db": "SECUNIA", "id": "60176", "trust": 1.0 }, { "db": "SECUNIA", "id": "59677", "trust": 1.0 }, { "db": "SECUNIA", "id": "59188", "trust": 1.0 }, { "db": "SECUNIA", "id": "59413", "trust": 1.0 }, { "db": "SECUNIA", "id": "58716", "trust": 1.0 }, { "db": "SECUNIA", "id": "59661", "trust": 1.0 }, { "db": "SECUNIA", "id": "59669", "trust": 1.0 }, { "db": "SECUNIA", "id": "59040", "trust": 1.0 }, { "db": "SECTRACK", "id": "1031032", "trust": 1.0 }, { "db": "SECTRACK", "id": "1031594", "trust": 1.0 }, { "db": "SIEMENS", "id": "SSA-234763", "trust": 1.0 }, { "db": "DLINK", "id": "SAP10045", "trust": 0.3 }, { "db": "DLINK", "id": "SAP10046", "trust": 0.3 }, { "db": "JUNIPER", "id": "JSA10643", "trust": 0.3 }, { "db": "JUNIPER", "id": "JSA10659", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-17-094-04", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-14-198-03F", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-14-198-03G", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-14-198-03B", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-14-198-03C", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-14-198-03", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-14-198-03D", "trust": 0.3 }, { "db": "JVN", "id": "JVN61247051", "trust": 0.3 }, { "db": "BID", "id": "67899", "trust": 0.3 }, { "db": "VULMON", "id": "CVE-2014-0224", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127386", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127607", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127936", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127136", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127841", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127166", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127190", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128345", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#978508" }, { "db": "VULMON", "id": "CVE-2014-0224" }, { "db": "BID", "id": "67899" }, { "db": "PACKETSTORM", "id": "127386" }, { "db": "PACKETSTORM", "id": "127607" }, { "db": "PACKETSTORM", "id": "127936" }, { "db": "PACKETSTORM", "id": "127136" }, { "db": "PACKETSTORM", "id": "127841" }, { "db": "PACKETSTORM", "id": "127166" }, { "db": "PACKETSTORM", "id": "127190" }, { "db": "PACKETSTORM", "id": "128345" }, { "db": "NVD", "id": "CVE-2014-0224" } ] }, "id": "VAR-201406-0445", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42688096370370365 }, "last_update_date": "2024-11-29T20:25:19.165000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Amazon Linux AMI: ALAS-2014-351", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-351" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03107 rev.3 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=d0eef6c81e529a1b8e4ea4b72eaef4d0" }, { "title": "Amazon Linux AMI: ALAS-2014-350", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-350" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=b92b65104373bc8476811ff1b99cd369" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03107 rev.3 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=a7d1e620ea07a6fd4d3ec24012763337" }, { "title": "Red Hat: CVE-2014-0224", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2014-0224" }, { "title": "Ubuntu Security Notice: openssl regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2232-3" }, { "title": "HP: HPSBPI03107 rev.3 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBPI03107" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2232-4" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2232-1" }, { "title": "Ubuntu Security Notice: openssl regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2232-2" }, { "title": "Debian Security Advisories: DSA-2950-1 openssl -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=909292f2afe623fbec51f7ab6b32f790" }, { "title": "Debian CVElist Bug Report Logs: openssl: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=07d14df4883f21063a053cea8d2239c6" }, { "title": "Tenable Security Advisories: [R8] Tenable Products Affected by OpenSSL \u0027CCS Injection\u0027 Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2014-03" }, { "title": "Amazon Linux AMI: ALAS-2014-349", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-349" }, { "title": "Debian CVElist Bug Report Logs: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=eee4d8c3e2b11de5b15ee65d96af6c60" }, { "title": "Symantec Security Advisories: SA80 : OpenSSL Security Advisory 05-Jun-2014", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=dd4667746d163d08265dfdd4c98e4201" }, { "title": "Citrix Security Bulletins: Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=afbd3a710e98424e558b1b21482abad6" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2014-0224 " }, { "title": "crochet-technologies", "trust": 0.1, "url": "https://github.com/crochet-technology/crochet-technologies " }, { "title": "openssl-ccs-cve-2014-0224", "trust": 0.1, "url": "https://github.com/ssllabs/openssl-ccs-cve-2014-0224 " }, { "title": "android-development-best-practices", "trust": 0.1, "url": "https://github.com/niharika2810/android-development-best-practices " }, { "title": "ssl-grader", "trust": 0.1, "url": "https://github.com/SSLyze410-SSLGrader-wCipherSuite-info/ssl-grader " }, { "title": "", "trust": 0.1, "url": "https://github.com/dtarnawsky/capacitor-plugin-security-provider " }, { "title": "qualysparser", "trust": 0.1, "url": "https://github.com/pr4jwal/qualysparser " }, { "title": "", "trust": 0.1, "url": "https://github.com/Wanderwille/13.01 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-0224" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2014-0224" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.openssl.org/news/secadv_20140605.txt" }, { "trust": 2.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" }, { "trust": 2.1, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0006.html" }, { "trust": 1.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" }, { "trust": 1.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=kb29217" }, { "trust": 1.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10629" }, { "trust": 1.3, "url": "http://support.citrix.com/article/ctx140876" }, { "trust": 1.3, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" }, { "trust": 1.3, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" }, { "trust": 1.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=kb29195" }, { "trust": 1.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" }, { "trust": 1.3, "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" }, { "trust": 1.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 1.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "trust": 1.3, "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" }, { "trust": 1.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095757" }, { "trust": 1.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095756" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" }, { "trust": 1.3, "url": "https://kb.bluecoat.com/index?page=content\u0026id=sa80" }, { "trust": 1.3, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10075" }, { "trust": 1.3, "url": "http://www.fortiguard.com/advisory/fg-ir-14-018/" }, { "trust": 1.3, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140605-openssl" }, { "trust": 1.3, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "trust": 1.3, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "trust": 1.3, "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "trust": 1.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020172" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2014-0630.html" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2014-0631.html" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2014-0633.html" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2014-0632.html" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2014-0627.html" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2014-0680.html" }, { "trust": 1.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095755" }, { "trust": 1.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095754" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" }, { "trust": 1.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095740" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" }, { "trust": 1.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" }, { "trust": 1.3, "url": "http://www.kb.cert.org/vuls/id/978508" }, { "trust": 1.1, "url": "http://www.freebsd.org/security/advisories/freebsd-sa-14:14.openssl.asc" }, { "trust": 1.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04401858" }, { "trust": 1.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-0625.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140389355508263\u0026w=2" }, { "trust": 1.0, "url": "http://seclists.org/fulldisclosure/2014/jun/38" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59666" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iv61506" }, { "trust": 1.0, "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59669" }, { "trust": 1.0, "url": "https://access.redhat.com/site/blogs/766093/posts/908133" }, { "trust": 1.0, "url": "http://support.apple.com/kb/ht6443" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60049" }, { "trust": 1.0, "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58939" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140266410314613\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58945" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58759" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58742" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59264" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58639" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" }, { "trust": 1.0, "url": "http://linux.oracle.com/errata/elsa-2014-1053.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140482916501310\u0026w=2" }, { "trust": 1.0, "url": "http://www.blackberry.com/btsc/kb36051" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59677" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59365" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59446" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58714" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59502" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59878" }, { "trust": 1.0, "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_release_notes.pdf" }, { "trust": 1.0, "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59589" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" }, { "trust": 1.0, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136473.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58716" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59444" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59347" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59459" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140431828824371\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59354" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59093" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59287" }, { "trust": 1.0, "url": "http://www.novell.com/support/kb/doc.php?id=7015264" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59101" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140604261522465\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58713" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140784085708882\u0026w=2" }, { "trust": 1.0, "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59454" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml" }, { "trust": 1.0, "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/releasenotes_for_snare_for_mssql.pdf" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59374" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60571" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59342" }, { "trust": 1.0, "url": "http://www.websense.com/support/article/kbarticle/vulnerabilities-resolved-in-triton-apx-version-8-0" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140904544427729\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59441" }, { "trust": 1.0, "url": "http://www.splunk.com/view/sp-caaam2d" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59284" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59162" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59301" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60176" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140448122410568\u0026w=2" }, { "trust": 1.0, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-august/136470.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59990" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59490" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59529" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=141147110427269\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59827" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59231" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59824" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=141658880509699\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58977" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59202" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59514" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59450" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58433" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58579" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58337" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59305" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60819" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59012" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020163" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59375" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59518" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2" }, { "trust": 1.0, "url": "http://puppetlabs.com/security/cve/cve-2014-0224" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59120" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59460" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59445" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140870499402361\u0026w=2" }, { "trust": 1.0, "url": "https://www.ibm.com/support/docview.wss?uid=ssg1s1004670" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59338" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59525" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60577" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" }, { "trust": 1.0, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" }, { "trust": 1.0, "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59440" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140499864129699\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58930" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59447" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140983229106599\u0026w=2" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id/1031594" }, { "trust": 1.0, "url": "http://www.ibm.com/support/docview.wss?uid=swg1it02314" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59132" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59370" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59310" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59142" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59483" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=141383410222440\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59448" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59282" }, { "trust": 1.0, "url": "http://ccsinjection.lepidum.co.jp" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140389274407904\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/61254" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59784" }, { "trust": 1.0, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0012.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59721" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004690" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140852826008699\u0026w=2" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58492" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59885" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59491" }, { "trust": 1.0, "url": "http://secunia.com/advisories/61815" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140544599631400\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58385" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59528" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60522" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58128" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140491231331543\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59306" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2014:105" }, { "trust": 1.0, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=6060\u0026myns=phmc\u0026mync=e" }, { "trust": 1.0, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05301946" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59389" }, { "trust": 1.0, "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=6061\u0026myns=phmc\u0026mync=e" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58743" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59530" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id/1031032" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59191" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140369637402535\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59449" }, { "trust": 1.0, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59413" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58660" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59063" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59135" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59040" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59364" }, { "trust": 1.0, "url": "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=bc8923b1ec9c467755cd86f7848c50ee8812e441" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59602" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58719" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59211" }, { "trust": 1.0, "url": "http://www.ibm.com/support/docview.wss?uid=isg3t1020948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59368" }, { "trust": 1.0, "url": "https://www.ibm.com/support/docview.wss?uid=ssg1s1004671" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59192" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140752315422991\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140317760000786\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58667" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59215" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59495" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140386311427810\u0026w=2" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59659" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59661" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58745" }, { "trust": 1.0, "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" }, { "trust": 1.0, "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/releasenotes_for_snare_for_windows.pdf" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60066" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=142350350616251\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59435" }, { "trust": 1.0, "url": "https://discussions.nessus.org/thread/7517" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59043" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59300" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59163" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59126" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59189" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59223" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59655" }, { "trust": 1.0, "url": "http://rhn.redhat.com/errata/rhsa-2014-0626.html" }, { "trust": 1.0, "url": "http://rhn.redhat.com/errata/rhsa-2014-0624.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59437" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" }, { "trust": 1.0, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" }, { "trust": 1.0, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58615" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59451" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59188" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59167" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59186" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59442" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59916" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59362" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59894" }, { "trust": 1.0, "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356" }, { "trust": 1.0, "url": "http://secunia.com/advisories/60567" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59190" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59325" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59004" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=141164638606214\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59506" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140794476212181\u0026w=2" }, { "trust": 1.0, "url": "http://www.novell.com/support/kb/doc.php?id=7015300" }, { "trust": 1.0, "url": "https://filezilla-project.org/versions.php?type=server" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=141025641601169\u0026w=2" }, { "trust": 1.0, "url": "https://www.novell.com/support/kb/doc.php?id=7015271" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59380" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140672208601650\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140621259019789\u0026w=2" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59175" }, { "trust": 1.0, "url": "http://esupport.trendmicro.com/solution/en-us/1103813.aspx" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59214" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2014:106" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=140852757108392\u0026w=2" }, { "trust": 1.0, "url": "http://www.ibm.com/support/docview.wss?uid=ssg1s1004678" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59429" }, { "trust": 1.0, "url": "http://seclists.org/fulldisclosure/2014/dec/23" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59438" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59383" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59055" }, { "trust": 1.0, "url": "http://www.kerio.com/support/kerio-control/release-history" }, { "trust": 0.8, "url": "http://ccsinjection.lepidum.co.jp/" }, { "trust": 0.8, "url": "http://ccsinjection.lepidum.co.jp/blog/2014-06-05/ccs-injection-en/index.html" }, { "trust": 0.8, "url": "https://plus.google.com/app/basic/stream/z12xhp3hbzbhhjgfm22ncvtbeua1dpaa004" }, { "trust": 0.8, "url": "http://support.attachmate.com/techdocs/2700.html" }, { "trust": 0.8, "url": "https://www.debian.org/security/2014/dsa-2950" }, { "trust": 0.8, "url": "https://admin.fedoraproject.org/updates/openssl-1.0.1e-38.fc19" }, { "trust": 0.8, "url": "http://jpn.nec.com/security-info/av14-002.html" }, { "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3566" }, { "trust": 0.8, "url": "http://linux.oracle.com/errata/elsa-2014-0625.html" }, { "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00003.html" }, { "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-2232-1/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0224" }, { "trust": 0.7, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.7, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.7, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0221" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3470" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0195" }, { "trust": 0.3, "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10045" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032618" }, { "trust": 0.3, "url": "http://www.sophos.com/en-us/support/knowledgebase/121112.aspx" }, { "trust": 0.3, "url": "http://sylpheed.sraoss.jp/en/news.html" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10629\u0026cat=sirt_1\u0026actp=list\u0026showdraft=false" }, { "trust": 0.3, "url": "http://www.arubanetworks.com/support/alerts/aid-06062014.txt" }, { "trust": 0.3, "url": "http://googlechromereleases.blogspot.com/2014/06/chrome-for-android-update.html" }, { "trust": 0.3, "url": "http://blogs.citrix.com/2014/06/06/citrix-security-advisory-for-openssl-vulnerabilities-june-2014/" }, { "trust": 0.3, "url": "http://bugs.python.org/issue21671" }, { "trust": 0.3, "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10046" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004805" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2014/aug/att-93/esa-2014-079.txt" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04438404" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687640" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21682840" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21678123" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21678073" }, { "trust": 0.3, "url": "http://www.websense.com/support/article/kbarticle/july-2014-hotfix-summary-for-websense-solutions" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10643\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "http://jvn.jp/en/jp/jvn61247051/index.html" }, { "trust": 0.3, "url": "http://openssl.org/" }, { "trust": 0.3, "url": "http://blogs.sophos.com/2014/06/10/openssl-man-in-the-middle-vulnerability-sophos-product-status-2/" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100181245" }, { "trust": 0.3, "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20140606_001_en.pdf" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004758" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004747" }, { "trust": 0.3, "url": "http://openvpn.net/index.php/open-source/downloads.html" }, { "trust": 0.3, "url": "http://www8.hp.com/us/en/software-solutions/operations-analytics-operations-analysis/" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21686583" }, { "trust": 0.3, "url": "https://community.rapid7.com/community/metasploit/blog/2014/06/05/security-advisory-openssl-vulnerabilities-cve-2014-0224-cve-2014-0221-in-metasploit" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685551" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096059" }, { "trust": 0.3, "url": "http://blogs.splunk.com/2014/06/09/splunk-and-the-latest-openssl-vulnerabilities/" }, { "trust": 0.3, "url": "http://www.marshut.com/ixwnpv/stunnel-5-02-released.html" }, { "trust": 0.3, "url": "http://blogs.sophos.com/2014/06/16/utm-up2date-9-113-released/" }, { "trust": 0.3, "url": "http://blogs.sophos.com/2014/06/18/utm-up2date-9-203-released/" }, { "trust": 0.3, "url": " https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04404764" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04385138" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100181099" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101007404" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100180978" }, { "trust": 0.3, "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-198-03" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/mar/21" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/mar/9" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10659" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03d" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03g" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100181096" }, { "trust": 0.3, "url": "http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=98ec479ee69ccb916d2ea4b09943faf5?nocount=true\u0026externalid=kb36051\u0026sliceid=1\u0026cmd=\u0026forward=nonthreadedkc\u0026command=show\u0026kcid=kb36051\u0026viewe" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21678040" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1it02314" }, { "trust": 0.3, "url": "http://kb.parallels.com/en/121916" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24036409" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032650#5.0.0.15" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032651" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24034955" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020948" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04355095" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04397114" }, { "trust": 0.3, "url": " https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479505" }, { "trust": 0.3, "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04512909" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04343424" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368264" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04347622" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04345210" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04347711" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349175" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349789" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04349897" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04351097" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04363613" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04368546" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04370307" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04378799" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04379485" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04392919" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04398968" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04401666" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04337774" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04451722" }, { "trust": 0.3, "url": "https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay\u0026spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c04406535-1%257cdoclocale%253d%" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docdisplay?docid=emr_na-c04425253" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04595094" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05301946" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04336637" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001840" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100181215" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21678356" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680546" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21680511,swg21680439,swg21680673,swg21680546" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg24037729" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095940" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678413" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680706,swg21680707,nas8n1020200,swg21680511,swg21680439,swg21680673,swg21680546" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21680673,swg21680546" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680707,nas8n1020200,swg21680511,swg21680439,swg21680673,swg21680546" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004830" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676889" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676673" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21678660" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676041" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21680439,swg21680673,swg21680546" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676128" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677891" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676536" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095910" }, { "trust": 0.3, "url": "https://www.xerox.com/download/security/security-bulletin/33a01-5228bdf5d027e/cert_security_mini-_bulletin_xrx15ao_for_cq8570-cq8870_v1-0.pdf" }, { "trust": 0.3, "url": "http://www.novell.com/support/kb/doc.php?id=7015158" }, { "trust": 0.3, "url": "http://securityadvisories.paloaltonetworks.com/home/detail/23?aspxautodetectcookiesupport=1" }, { "trust": 0.3, "url": "https://bto.bluecoat.com/security-advisory/sa80" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100181079" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100181566" }, { "trust": 0.3, "url": "https://library.netapp.com/ecm/ecm_get_file/ecmp1636026" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020200" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676356" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676276" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676786" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2014-0629.html" }, { "trust": 0.3, "url": "http://forums.alienvault.com/discussion/3054/security-advisory-alienvault-v4-10-0-addresses-several-vulnerabilities" }, { "trust": 0.3, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-345106.htm" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676793" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021009" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676840" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21677225" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682398" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095738" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020163" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21683336" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678104" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682023" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021064" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682026" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682025" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682024" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21677080" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676877" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095841" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690128" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004678" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004824" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004690" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676542" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676543" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004744" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676333" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21678289" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004695" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676708" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21676505" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03b" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03c" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-198-03f" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020976" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1020952" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007987" }, { "trust": 0.3, "url": "http://googlechromereleases.blogspot.com/2014/06/stable-channel-update-for-chrome-os.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001842" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001839" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004821" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004670" }, { "trust": 0.3, "url": "www-01.ibm.com/support/docview.wss?uid=ssg1s1004671" }, { "trust": 0.3, "url": "http://www.ubuntu.com/usn/usn-2232-4/" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10629\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "http://winscp.net/eng/docs/history#5.5.4" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0076" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0198" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-5298" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_n" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-0076" }, { "trust": 0.1, "url": "https://access.redhat.com/site/articles/904433" }, { "trust": 0.1, "url": "http://www.hp.com/jp/icewall_patchaccess" }, { "trust": 0.1, "url": "http://h18013.www1.hp.com/products/servers/management/fpdownload.html" }, { "trust": 0.1, "url": "http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00073" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00074" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00070" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00076" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00079" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00071" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00075" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00078" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00072" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/hpcit_00077" }, { "trust": 0.1, "url": "https://h20392.www2.hp.com/portal/swdepot/displayp" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/exsc_00017" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/exsc_00015" }, { "trust": 0.1, "url": "http://support.openview.hp.com/selfsolve/document/lid/exsc_00016" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2232-3" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2232-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1332643" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19" }, { "trust": 0.1, "url": "http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=c03536" }, { "trust": 0.1, "url": "https://www.hp.com" } ], "sources": [ { "db": "CERT/CC", "id": "VU#978508" }, { "db": "BID", "id": "67899" }, { "db": "PACKETSTORM", "id": "127386" }, { "db": "PACKETSTORM", "id": "127607" }, { "db": "PACKETSTORM", "id": "127936" }, { "db": "PACKETSTORM", "id": "127136" }, { "db": "PACKETSTORM", "id": "127841" }, { "db": "PACKETSTORM", "id": "127166" }, { "db": "PACKETSTORM", "id": "127190" }, { "db": "PACKETSTORM", "id": "128345" }, { "db": "NVD", "id": "CVE-2014-0224" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#978508" }, { "db": "VULMON", "id": "CVE-2014-0224" }, { "db": "BID", "id": "67899" }, { "db": "PACKETSTORM", "id": "127386" }, { "db": "PACKETSTORM", "id": "127607" }, { "db": "PACKETSTORM", "id": "127936" }, { "db": "PACKETSTORM", "id": "127136" }, { "db": "PACKETSTORM", "id": "127841" }, { "db": "PACKETSTORM", "id": "127166" }, { "db": "PACKETSTORM", "id": "127190" }, { "db": "PACKETSTORM", "id": "128345" }, { "db": "NVD", "id": "CVE-2014-0224" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-05T00:00:00", "db": "CERT/CC", "id": "VU#978508" }, { "date": "2014-06-05T00:00:00", "db": "VULMON", "id": "CVE-2014-0224" }, { "date": "2014-06-05T00:00:00", "db": "BID", "id": "67899" }, { "date": "2014-07-09T04:03:23", "db": "PACKETSTORM", "id": "127386" }, { "date": "2014-07-24T23:47:46", "db": "PACKETSTORM", "id": "127607" }, { "date": "2014-08-20T15:18:26", "db": "PACKETSTORM", "id": "127936" }, { "date": "2014-06-17T23:11:00", "db": "PACKETSTORM", "id": "127136" }, { "date": "2014-08-12T20:56:59", "db": "PACKETSTORM", "id": "127841" }, { "date": "2014-06-24T00:52:51", "db": "PACKETSTORM", "id": "127166" }, { "date": "2014-06-24T01:45:14", "db": "PACKETSTORM", "id": "127190" }, { "date": "2014-09-22T16:56:00", "db": "PACKETSTORM", "id": "128345" }, { "date": "2014-06-05T21:55:07.817000", "db": "NVD", "id": "CVE-2014-0224" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-27T00:00:00", "db": "CERT/CC", "id": "VU#978508" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2014-0224" }, { "date": "2017-10-19T03:03:00", "db": "BID", "id": "67899" }, { "date": "2024-11-21T02:01:41", "db": "NVD", "id": "CVE-2014-0224" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "67899" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL is vulnerable to a man-in-the-middle attack", "sources": [ { "db": "CERT/CC", "id": "VU#978508" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "67899" } ], "trust": 0.3 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.